May 17 00:45:49.661801 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:45:49.661815 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:45:49.661821 kernel: Disabled fast string operations May 17 00:45:49.661825 kernel: BIOS-provided physical RAM map: May 17 00:45:49.661829 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 17 00:45:49.661833 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 17 00:45:49.661838 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 17 00:45:49.661842 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 17 00:45:49.661846 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 17 00:45:49.662949 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 17 00:45:49.662956 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 17 00:45:49.662961 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 17 00:45:49.662965 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 17 00:45:49.662969 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 17 00:45:49.662976 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 17 00:45:49.662981 kernel: NX (Execute Disable) protection: active May 17 00:45:49.662985 kernel: SMBIOS 2.7 present. May 17 00:45:49.662990 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 17 00:45:49.662994 kernel: vmware: hypercall mode: 0x00 May 17 00:45:49.662999 kernel: Hypervisor detected: VMware May 17 00:45:49.663004 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 17 00:45:49.663009 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 17 00:45:49.663013 kernel: vmware: using clock offset of 5249695294 ns May 17 00:45:49.663017 kernel: tsc: Detected 3408.000 MHz processor May 17 00:45:49.663022 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:45:49.663027 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:45:49.663032 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 17 00:45:49.663037 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:45:49.663041 kernel: total RAM covered: 3072M May 17 00:45:49.663047 kernel: Found optimal setting for mtrr clean up May 17 00:45:49.663052 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 17 00:45:49.663056 kernel: Using GB pages for direct mapping May 17 00:45:49.663061 kernel: ACPI: Early table checksum verification disabled May 17 00:45:49.663065 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 17 00:45:49.663070 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 17 00:45:49.663074 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 17 00:45:49.663079 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 17 00:45:49.663084 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 17 00:45:49.663088 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 17 00:45:49.663094 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 17 00:45:49.663100 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 17 00:45:49.663105 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 17 00:45:49.663110 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 17 00:45:49.663115 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 17 00:45:49.663121 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 17 00:45:49.663126 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 17 00:45:49.663131 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 17 00:45:49.663136 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 17 00:45:49.663141 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 17 00:45:49.663145 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 17 00:45:49.663150 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 17 00:45:49.663155 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 17 00:45:49.663160 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 17 00:45:49.663166 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 17 00:45:49.663171 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 17 00:45:49.663176 kernel: system APIC only can use physical flat May 17 00:45:49.663181 kernel: Setting APIC routing to physical flat. May 17 00:45:49.663186 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:45:49.663190 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 17 00:45:49.663195 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 17 00:45:49.663200 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 17 00:45:49.663205 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 17 00:45:49.663211 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 17 00:45:49.663215 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 17 00:45:49.663220 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 17 00:45:49.663225 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 17 00:45:49.663247 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 17 00:45:49.663251 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 17 00:45:49.663256 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 17 00:45:49.663261 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 17 00:45:49.663266 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 17 00:45:49.663271 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 17 00:45:49.663291 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 17 00:45:49.663296 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 17 00:45:49.663301 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 17 00:45:49.663306 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 17 00:45:49.663311 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 17 00:45:49.663315 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 17 00:45:49.663320 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 17 00:45:49.663325 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 17 00:45:49.663329 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 17 00:45:49.663334 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 17 00:45:49.663340 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 17 00:45:49.663345 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 17 00:45:49.663349 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 17 00:45:49.663354 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 17 00:45:49.663359 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 17 00:45:49.663364 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 17 00:45:49.663368 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 17 00:45:49.663373 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 17 00:45:49.663378 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 17 00:45:49.663383 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 17 00:45:49.663389 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 17 00:45:49.663394 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 17 00:45:49.663398 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 17 00:45:49.663403 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 17 00:45:49.663408 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 17 00:45:49.663412 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 17 00:45:49.663417 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 17 00:45:49.663422 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 17 00:45:49.663426 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 17 00:45:49.663431 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 17 00:45:49.663437 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 17 00:45:49.663442 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 17 00:45:49.663446 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 17 00:45:49.663451 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 17 00:45:49.663456 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 17 00:45:49.663460 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 17 00:45:49.663465 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 17 00:45:49.663470 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 17 00:45:49.663474 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 17 00:45:49.663479 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 17 00:45:49.663484 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 17 00:45:49.663489 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 17 00:45:49.663494 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 17 00:45:49.663499 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 17 00:45:49.663503 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 17 00:45:49.663509 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 17 00:45:49.663517 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 17 00:45:49.663523 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 17 00:45:49.663528 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 17 00:45:49.663533 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 17 00:45:49.663557 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 17 00:45:49.663562 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 17 00:45:49.663567 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 17 00:45:49.663572 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 17 00:45:49.663578 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 17 00:45:49.663583 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 17 00:45:49.663588 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 17 00:45:49.663594 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 17 00:45:49.663614 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 17 00:45:49.663619 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 17 00:45:49.663624 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 17 00:45:49.663629 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 17 00:45:49.663634 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 17 00:45:49.663640 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 17 00:45:49.663645 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 17 00:45:49.663650 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 17 00:45:49.663655 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 17 00:45:49.663660 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 17 00:45:49.663666 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 17 00:45:49.663671 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 17 00:45:49.663677 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 17 00:45:49.663682 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 17 00:45:49.663687 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 17 00:45:49.663692 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 17 00:45:49.663697 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 17 00:45:49.663702 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 17 00:45:49.663707 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 17 00:45:49.663713 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 17 00:45:49.663718 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 17 00:45:49.663723 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 17 00:45:49.663728 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 17 00:45:49.663733 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 17 00:45:49.663738 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 17 00:45:49.663743 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 17 00:45:49.663748 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 17 00:45:49.663753 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 17 00:45:49.663758 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 17 00:45:49.663765 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 17 00:45:49.663770 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 17 00:45:49.663775 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 17 00:45:49.663780 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 17 00:45:49.663785 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 17 00:45:49.663790 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 17 00:45:49.663795 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 17 00:45:49.663800 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 17 00:45:49.663805 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 17 00:45:49.663810 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 17 00:45:49.663816 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 17 00:45:49.663821 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 17 00:45:49.663826 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 17 00:45:49.663831 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 17 00:45:49.663836 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 17 00:45:49.663841 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 17 00:45:49.663846 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 17 00:45:49.663857 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 17 00:45:49.667422 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 17 00:45:49.667430 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 17 00:45:49.667437 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 17 00:45:49.667443 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 17 00:45:49.667448 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 17 00:45:49.667453 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 17 00:45:49.667459 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 17 00:45:49.667464 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 17 00:45:49.667469 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:45:49.667475 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:45:49.667480 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 17 00:45:49.667486 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 17 00:45:49.667493 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 17 00:45:49.667498 kernel: Zone ranges: May 17 00:45:49.667504 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:45:49.667509 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 17 00:45:49.667514 kernel: Normal empty May 17 00:45:49.667520 kernel: Movable zone start for each node May 17 00:45:49.667525 kernel: Early memory node ranges May 17 00:45:49.667534 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 17 00:45:49.667539 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 17 00:45:49.667546 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 17 00:45:49.667551 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 17 00:45:49.667556 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:45:49.667562 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 17 00:45:49.667567 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 17 00:45:49.667572 kernel: ACPI: PM-Timer IO Port: 0x1008 May 17 00:45:49.667578 kernel: system APIC only can use physical flat May 17 00:45:49.667583 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 17 00:45:49.667588 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 17 00:45:49.667595 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 17 00:45:49.667600 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 17 00:45:49.667605 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 17 00:45:49.667610 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 17 00:45:49.667616 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 17 00:45:49.667621 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 17 00:45:49.667626 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 17 00:45:49.667632 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 17 00:45:49.667637 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 17 00:45:49.667642 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 17 00:45:49.667648 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 17 00:45:49.667653 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 17 00:45:49.667659 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 17 00:45:49.667664 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 17 00:45:49.667669 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 17 00:45:49.667674 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 17 00:45:49.667680 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 17 00:45:49.667685 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 17 00:45:49.667690 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 17 00:45:49.667697 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 17 00:45:49.667702 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 17 00:45:49.667707 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 17 00:45:49.667712 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 17 00:45:49.667717 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 17 00:45:49.667723 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 17 00:45:49.667728 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 17 00:45:49.667733 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 17 00:45:49.667738 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 17 00:45:49.667743 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 17 00:45:49.667750 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 17 00:45:49.667755 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 17 00:45:49.667760 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 17 00:45:49.667765 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 17 00:45:49.667771 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 17 00:45:49.667776 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 17 00:45:49.667781 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 17 00:45:49.667786 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 17 00:45:49.667792 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 17 00:45:49.667798 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 17 00:45:49.667803 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 17 00:45:49.667808 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 17 00:45:49.667813 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 17 00:45:49.667818 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 17 00:45:49.667824 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 17 00:45:49.667829 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 17 00:45:49.667834 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 17 00:45:49.667839 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 17 00:45:49.667844 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 17 00:45:49.667878 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 17 00:45:49.667883 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 17 00:45:49.667889 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 17 00:45:49.667899 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 17 00:45:49.667905 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 17 00:45:49.667910 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 17 00:45:49.667915 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 17 00:45:49.667920 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 17 00:45:49.667926 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 17 00:45:49.667932 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 17 00:45:49.667938 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 17 00:45:49.667943 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 17 00:45:49.667948 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 17 00:45:49.667953 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 17 00:45:49.667959 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 17 00:45:49.667964 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 17 00:45:49.667969 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 17 00:45:49.667974 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 17 00:45:49.667979 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 17 00:45:49.667986 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 17 00:45:49.667991 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 17 00:45:49.667996 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 17 00:45:49.668001 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 17 00:45:49.668007 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 17 00:45:49.668012 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 17 00:45:49.668017 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 17 00:45:49.668022 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 17 00:45:49.668028 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 17 00:45:49.668034 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 17 00:45:49.668039 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 17 00:45:49.668044 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 17 00:45:49.668050 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 17 00:45:49.668055 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 17 00:45:49.668060 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 17 00:45:49.668065 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 17 00:45:49.668070 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 17 00:45:49.668075 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 17 00:45:49.668081 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 17 00:45:49.668087 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 17 00:45:49.668092 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 17 00:45:49.668097 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 17 00:45:49.668102 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 17 00:45:49.668107 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 17 00:45:49.668113 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 17 00:45:49.668118 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 17 00:45:49.668123 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 17 00:45:49.668128 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 17 00:45:49.668135 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 17 00:45:49.668140 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 17 00:45:49.668145 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 17 00:45:49.668151 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 17 00:45:49.668156 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 17 00:45:49.668161 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 17 00:45:49.668166 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 17 00:45:49.668171 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 17 00:45:49.668177 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 17 00:45:49.668182 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 17 00:45:49.668188 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 17 00:45:49.668193 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 17 00:45:49.668198 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 17 00:45:49.668203 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 17 00:45:49.668208 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 17 00:45:49.668214 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 17 00:45:49.668219 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 17 00:45:49.668224 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 17 00:45:49.668230 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 17 00:45:49.668236 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 17 00:45:49.668241 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 17 00:45:49.668246 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 17 00:45:49.668251 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 17 00:45:49.668257 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 17 00:45:49.668262 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 17 00:45:49.668267 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 17 00:45:49.668272 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 17 00:45:49.668277 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 17 00:45:49.668283 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 17 00:45:49.668289 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 17 00:45:49.668294 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 17 00:45:49.668299 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 17 00:45:49.668304 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 17 00:45:49.668310 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:45:49.668315 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 17 00:45:49.668320 kernel: TSC deadline timer available May 17 00:45:49.668325 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 17 00:45:49.668331 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 17 00:45:49.668337 kernel: Booting paravirtualized kernel on VMware hypervisor May 17 00:45:49.668342 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:45:49.668348 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 17 00:45:49.668353 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 17 00:45:49.668358 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 17 00:45:49.668364 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 17 00:45:49.668369 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 17 00:45:49.668374 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 17 00:45:49.668379 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 17 00:45:49.668385 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 17 00:45:49.668390 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 17 00:45:49.668396 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 17 00:45:49.668408 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 17 00:45:49.668414 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 17 00:45:49.668420 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 17 00:45:49.668425 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 17 00:45:49.668431 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 17 00:45:49.668438 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 17 00:45:49.668443 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 17 00:45:49.668448 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 17 00:45:49.668454 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 17 00:45:49.668459 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 17 00:45:49.668465 kernel: Policy zone: DMA32 May 17 00:45:49.668471 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:45:49.668478 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:45:49.668484 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 17 00:45:49.668490 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 17 00:45:49.668496 kernel: printk: log_buf_len min size: 262144 bytes May 17 00:45:49.668501 kernel: printk: log_buf_len: 1048576 bytes May 17 00:45:49.668507 kernel: printk: early log buf free: 239728(91%) May 17 00:45:49.668513 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:45:49.668519 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:45:49.668524 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:45:49.668530 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) May 17 00:45:49.668537 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 17 00:45:49.668542 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:45:49.668548 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:45:49.668555 kernel: rcu: Hierarchical RCU implementation. May 17 00:45:49.668561 kernel: rcu: RCU event tracing is enabled. May 17 00:45:49.668567 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 17 00:45:49.668573 kernel: Rude variant of Tasks RCU enabled. May 17 00:45:49.668579 kernel: Tracing variant of Tasks RCU enabled. May 17 00:45:49.668585 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:45:49.668590 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 17 00:45:49.668596 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 17 00:45:49.668603 kernel: random: crng init done May 17 00:45:49.668608 kernel: Console: colour VGA+ 80x25 May 17 00:45:49.668614 kernel: printk: console [tty0] enabled May 17 00:45:49.668619 kernel: printk: console [ttyS0] enabled May 17 00:45:49.668626 kernel: ACPI: Core revision 20210730 May 17 00:45:49.668632 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 17 00:45:49.668638 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:45:49.668643 kernel: x2apic enabled May 17 00:45:49.668649 kernel: Switched APIC routing to physical x2apic. May 17 00:45:49.668654 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:45:49.668660 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 17 00:45:49.668666 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 17 00:45:49.668672 kernel: Disabled fast string operations May 17 00:45:49.668677 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:45:49.668685 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:45:49.668690 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:45:49.668696 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 17 00:45:49.668702 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 00:45:49.668708 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 00:45:49.668714 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 17 00:45:49.668719 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 17 00:45:49.668725 kernel: RETBleed: Mitigation: Enhanced IBRS May 17 00:45:49.668731 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:45:49.668737 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:45:49.668743 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:45:49.668749 kernel: SRBDS: Unknown: Dependent on hypervisor status May 17 00:45:49.668754 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:45:49.668760 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:45:49.668766 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:45:49.668771 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:45:49.668777 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:45:49.668783 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 17 00:45:49.668789 kernel: Freeing SMP alternatives memory: 32K May 17 00:45:49.668795 kernel: pid_max: default: 131072 minimum: 1024 May 17 00:45:49.668801 kernel: LSM: Security Framework initializing May 17 00:45:49.668806 kernel: SELinux: Initializing. May 17 00:45:49.668812 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:45:49.668818 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:45:49.668823 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 17 00:45:49.668829 kernel: Performance Events: Skylake events, core PMU driver. May 17 00:45:49.668836 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 17 00:45:49.668841 kernel: core: CPUID marked event: 'instructions' unavailable May 17 00:45:49.668847 kernel: core: CPUID marked event: 'bus cycles' unavailable May 17 00:45:49.668869 kernel: core: CPUID marked event: 'cache references' unavailable May 17 00:45:49.668875 kernel: core: CPUID marked event: 'cache misses' unavailable May 17 00:45:49.668880 kernel: core: CPUID marked event: 'branch instructions' unavailable May 17 00:45:49.668886 kernel: core: CPUID marked event: 'branch misses' unavailable May 17 00:45:49.668892 kernel: ... version: 1 May 17 00:45:49.668899 kernel: ... bit width: 48 May 17 00:45:49.668904 kernel: ... generic registers: 4 May 17 00:45:49.668910 kernel: ... value mask: 0000ffffffffffff May 17 00:45:49.668916 kernel: ... max period: 000000007fffffff May 17 00:45:49.668922 kernel: ... fixed-purpose events: 0 May 17 00:45:49.668928 kernel: ... event mask: 000000000000000f May 17 00:45:49.668934 kernel: signal: max sigframe size: 1776 May 17 00:45:49.668939 kernel: rcu: Hierarchical SRCU implementation. May 17 00:45:49.668945 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:45:49.668950 kernel: smp: Bringing up secondary CPUs ... May 17 00:45:49.668957 kernel: x86: Booting SMP configuration: May 17 00:45:49.668963 kernel: .... node #0, CPUs: #1 May 17 00:45:49.668968 kernel: Disabled fast string operations May 17 00:45:49.668974 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 17 00:45:49.668979 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 17 00:45:49.668985 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:45:49.668990 kernel: smpboot: Max logical packages: 128 May 17 00:45:49.668996 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 17 00:45:49.669002 kernel: devtmpfs: initialized May 17 00:45:49.669009 kernel: x86/mm: Memory block size: 128MB May 17 00:45:49.669015 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 17 00:45:49.669021 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:45:49.669027 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 17 00:45:49.669033 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:45:49.669038 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:45:49.669044 kernel: audit: initializing netlink subsys (disabled) May 17 00:45:49.669049 kernel: audit: type=2000 audit(1747442748.061:1): state=initialized audit_enabled=0 res=1 May 17 00:45:49.669055 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:45:49.669061 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:45:49.669067 kernel: cpuidle: using governor menu May 17 00:45:49.669073 kernel: Simple Boot Flag at 0x36 set to 0x80 May 17 00:45:49.669078 kernel: ACPI: bus type PCI registered May 17 00:45:49.669084 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:45:49.669090 kernel: dca service started, version 1.12.1 May 17 00:45:49.669095 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 17 00:45:49.669101 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 17 00:45:49.669107 kernel: PCI: Using configuration type 1 for base access May 17 00:45:49.669113 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:45:49.669119 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:45:49.669125 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:45:49.669130 kernel: ACPI: Added _OSI(Module Device) May 17 00:45:49.669136 kernel: ACPI: Added _OSI(Processor Device) May 17 00:45:49.669141 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:45:49.669147 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:45:49.669152 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:45:49.669158 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:45:49.669164 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:45:49.669170 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:45:49.669176 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 17 00:45:49.669182 kernel: ACPI: Interpreter enabled May 17 00:45:49.669187 kernel: ACPI: PM: (supports S0 S1 S5) May 17 00:45:49.669193 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:45:49.669199 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:45:49.669205 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 17 00:45:49.669210 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 17 00:45:49.669292 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 00:45:49.669343 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 17 00:45:49.669388 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 17 00:45:49.669396 kernel: PCI host bridge to bus 0000:00 May 17 00:45:49.669444 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:45:49.669486 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 17 00:45:49.669530 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 17 00:45:49.669571 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:45:49.669612 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 17 00:45:49.669652 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 17 00:45:49.669707 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 17 00:45:49.669762 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 17 00:45:49.669814 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 17 00:45:49.669876 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 17 00:45:49.669924 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 17 00:45:49.669971 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:45:49.670019 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:45:49.670065 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:45:49.670111 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:45:49.670161 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 17 00:45:49.670210 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 17 00:45:49.670257 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 17 00:45:49.670307 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 17 00:45:49.670356 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 17 00:45:49.670403 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 17 00:45:49.670453 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 17 00:45:49.670501 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 17 00:45:49.670550 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 17 00:45:49.670596 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 17 00:45:49.670642 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 17 00:45:49.670687 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:45:49.670738 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 17 00:45:49.670788 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.670837 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 17 00:45:49.672771 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.672831 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 17 00:45:49.672900 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.672973 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 17 00:45:49.673245 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.673301 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 17 00:45:49.673355 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.673423 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 17 00:45:49.674131 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674184 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 17 00:45:49.674237 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674288 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 17 00:45:49.674338 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674385 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 17 00:45:49.674434 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674481 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 17 00:45:49.674556 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674620 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 17 00:45:49.674671 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674719 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 17 00:45:49.674768 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.674814 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 17 00:45:49.675889 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.675949 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 17 00:45:49.676000 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676048 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 17 00:45:49.676097 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676143 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 17 00:45:49.676191 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676240 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 17 00:45:49.676290 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676336 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 17 00:45:49.676383 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676429 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 17 00:45:49.676480 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676528 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 17 00:45:49.676577 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676623 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 17 00:45:49.676672 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676718 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 17 00:45:49.676767 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.676815 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 17 00:45:49.677886 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.677938 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 17 00:45:49.677987 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678033 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 17 00:45:49.678081 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678129 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 17 00:45:49.678177 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678222 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 17 00:45:49.678272 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678317 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 17 00:45:49.678366 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678412 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 17 00:45:49.678462 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678513 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 17 00:45:49.678571 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678618 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 17 00:45:49.678667 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678712 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 17 00:45:49.678763 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 17 00:45:49.678809 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 17 00:45:49.681882 kernel: pci_bus 0000:01: extended config space not accessible May 17 00:45:49.681956 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 00:45:49.682013 kernel: pci_bus 0000:02: extended config space not accessible May 17 00:45:49.682022 kernel: acpiphp: Slot [32] registered May 17 00:45:49.682028 kernel: acpiphp: Slot [33] registered May 17 00:45:49.682036 kernel: acpiphp: Slot [34] registered May 17 00:45:49.682042 kernel: acpiphp: Slot [35] registered May 17 00:45:49.682047 kernel: acpiphp: Slot [36] registered May 17 00:45:49.682053 kernel: acpiphp: Slot [37] registered May 17 00:45:49.682059 kernel: acpiphp: Slot [38] registered May 17 00:45:49.682064 kernel: acpiphp: Slot [39] registered May 17 00:45:49.682070 kernel: acpiphp: Slot [40] registered May 17 00:45:49.682076 kernel: acpiphp: Slot [41] registered May 17 00:45:49.682082 kernel: acpiphp: Slot [42] registered May 17 00:45:49.682089 kernel: acpiphp: Slot [43] registered May 17 00:45:49.682095 kernel: acpiphp: Slot [44] registered May 17 00:45:49.682101 kernel: acpiphp: Slot [45] registered May 17 00:45:49.682106 kernel: acpiphp: Slot [46] registered May 17 00:45:49.682112 kernel: acpiphp: Slot [47] registered May 17 00:45:49.682118 kernel: acpiphp: Slot [48] registered May 17 00:45:49.682123 kernel: acpiphp: Slot [49] registered May 17 00:45:49.682129 kernel: acpiphp: Slot [50] registered May 17 00:45:49.682429 kernel: acpiphp: Slot [51] registered May 17 00:45:49.682437 kernel: acpiphp: Slot [52] registered May 17 00:45:49.682445 kernel: acpiphp: Slot [53] registered May 17 00:45:49.682451 kernel: acpiphp: Slot [54] registered May 17 00:45:49.682457 kernel: acpiphp: Slot [55] registered May 17 00:45:49.682463 kernel: acpiphp: Slot [56] registered May 17 00:45:49.682469 kernel: acpiphp: Slot [57] registered May 17 00:45:49.682475 kernel: acpiphp: Slot [58] registered May 17 00:45:49.682480 kernel: acpiphp: Slot [59] registered May 17 00:45:49.682486 kernel: acpiphp: Slot [60] registered May 17 00:45:49.682492 kernel: acpiphp: Slot [61] registered May 17 00:45:49.682498 kernel: acpiphp: Slot [62] registered May 17 00:45:49.682504 kernel: acpiphp: Slot [63] registered May 17 00:45:49.682563 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 17 00:45:49.682614 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 17 00:45:49.682834 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 17 00:45:49.682908 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:45:49.682959 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 17 00:45:49.683008 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 17 00:45:49.683365 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 17 00:45:49.683417 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 17 00:45:49.683465 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 17 00:45:49.683529 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 17 00:45:49.683926 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 17 00:45:49.683986 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 17 00:45:49.684041 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 17 00:45:49.684098 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 17 00:45:49.684152 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 17 00:45:49.684481 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 17 00:45:49.685937 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 17 00:45:49.685999 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 17 00:45:49.686056 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 17 00:45:49.686110 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 17 00:45:49.686166 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 17 00:45:49.686222 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:45:49.686275 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 17 00:45:49.686326 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 17 00:45:49.686377 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 17 00:45:49.686428 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:45:49.686480 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 17 00:45:49.686531 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 17 00:45:49.686584 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:45:49.686637 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 17 00:45:49.686687 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 17 00:45:49.686739 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:45:49.686793 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 17 00:45:49.686897 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 17 00:45:49.686957 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:45:49.687015 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 17 00:45:49.687066 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 17 00:45:49.687118 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:45:49.687175 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 17 00:45:49.687227 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 17 00:45:49.687277 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:45:49.687338 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 17 00:45:49.687392 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 17 00:45:49.687446 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 17 00:45:49.687498 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 17 00:45:49.687551 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 17 00:45:49.687603 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 17 00:45:49.687657 kernel: pci 0000:0b:00.0: supports D1 D2 May 17 00:45:49.687712 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 17 00:45:49.687770 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 17 00:45:49.687823 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 17 00:45:49.687884 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 17 00:45:49.687944 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 17 00:45:49.687998 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 17 00:45:49.688048 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 17 00:45:49.688106 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 17 00:45:49.688167 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:45:49.688220 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 17 00:45:49.688270 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 17 00:45:49.688321 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 17 00:45:49.688371 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:45:49.688424 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 17 00:45:49.688475 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 17 00:45:49.688528 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:45:49.688585 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 17 00:45:49.688636 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 17 00:45:49.688686 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:45:49.688743 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 17 00:45:49.688795 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 17 00:45:49.688845 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:45:49.688909 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 17 00:45:49.688964 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 17 00:45:49.689015 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:45:49.689072 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 17 00:45:49.689123 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 17 00:45:49.689175 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:45:49.689227 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 17 00:45:49.689279 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 17 00:45:49.689329 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 17 00:45:49.692185 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:45:49.692242 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 17 00:45:49.692292 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 17 00:45:49.692654 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 17 00:45:49.692706 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:45:49.692757 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 17 00:45:49.693527 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 17 00:45:49.693591 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 17 00:45:49.693644 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:45:49.693695 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 17 00:45:49.693743 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 17 00:45:49.693796 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:45:49.693845 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 17 00:45:49.693913 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 17 00:45:49.693960 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:45:49.694009 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 17 00:45:49.694059 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 17 00:45:49.694110 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:45:49.694160 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 17 00:45:49.694213 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 17 00:45:49.694281 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:45:49.694332 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 17 00:45:49.694379 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 17 00:45:49.694425 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:45:49.694476 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 17 00:45:49.694523 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 17 00:45:49.694575 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 17 00:45:49.694621 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:45:49.694670 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 17 00:45:49.694721 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 17 00:45:49.694768 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 17 00:45:49.694817 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:45:49.694877 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 17 00:45:49.694926 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 17 00:45:49.694976 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:45:49.695027 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 17 00:45:49.695074 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 17 00:45:49.695120 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:45:49.695168 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 17 00:45:49.695216 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 17 00:45:49.695267 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:45:49.695617 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 17 00:45:49.695671 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 17 00:45:49.695720 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:45:49.695769 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 17 00:45:49.695817 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 17 00:45:49.695874 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:45:49.695926 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 17 00:45:49.695973 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 17 00:45:49.696019 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:45:49.696027 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 17 00:45:49.696033 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 17 00:45:49.696039 kernel: ACPI: PCI: Interrupt link LNKB disabled May 17 00:45:49.696044 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:45:49.696050 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 17 00:45:49.696056 kernel: iommu: Default domain type: Translated May 17 00:45:49.696063 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:45:49.696110 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 17 00:45:49.696157 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:45:49.696203 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 17 00:45:49.696211 kernel: vgaarb: loaded May 17 00:45:49.696217 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:45:49.696223 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:45:49.696229 kernel: PTP clock support registered May 17 00:45:49.696235 kernel: PCI: Using ACPI for IRQ routing May 17 00:45:49.696242 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:45:49.696248 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 17 00:45:49.696254 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 17 00:45:49.696259 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 17 00:45:49.696265 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 17 00:45:49.696271 kernel: clocksource: Switched to clocksource tsc-early May 17 00:45:49.696277 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:45:49.696282 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:45:49.696288 kernel: pnp: PnP ACPI init May 17 00:45:49.696339 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 17 00:45:49.696388 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 17 00:45:49.696431 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 17 00:45:49.696477 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 17 00:45:49.696522 kernel: pnp 00:06: [dma 2] May 17 00:45:49.696567 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 17 00:45:49.696618 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 17 00:45:49.696661 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 17 00:45:49.696669 kernel: pnp: PnP ACPI: found 8 devices May 17 00:45:49.696675 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:45:49.696681 kernel: NET: Registered PF_INET protocol family May 17 00:45:49.696687 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:45:49.696693 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:45:49.696698 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:45:49.696706 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:45:49.696712 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:45:49.696718 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:45:49.696723 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:45:49.696729 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:45:49.696735 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:45:49.696741 kernel: NET: Registered PF_XDP protocol family May 17 00:45:49.696789 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 17 00:45:49.696842 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 17 00:45:49.696898 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 17 00:45:49.696947 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 17 00:45:49.696995 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 17 00:45:49.697062 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 17 00:45:49.697125 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 17 00:45:49.697191 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 17 00:45:49.697259 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 17 00:45:49.697310 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 17 00:45:49.697357 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 17 00:45:49.697404 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 17 00:45:49.697455 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 17 00:45:49.697505 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 17 00:45:49.697557 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 17 00:45:49.697605 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 17 00:45:49.697662 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 17 00:45:49.697715 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 17 00:45:49.697762 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 17 00:45:49.697812 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 17 00:45:49.699062 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 17 00:45:49.699123 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 17 00:45:49.699179 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 17 00:45:49.699459 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:45:49.699513 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:45:49.699566 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.699638 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.700025 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.700084 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.700134 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.700181 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.700229 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.700285 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.700336 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.700407 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.700754 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.700806 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.700875 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701229 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701280 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701330 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701391 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701457 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701519 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701582 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701640 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701687 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701733 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701779 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701829 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.701904 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.701953 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.702000 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.702048 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.702221 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.702275 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 17 00:45:49.702322 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.702373 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.702447 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.702637 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.702688 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.702735 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.703093 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.703153 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.703202 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.703253 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.703302 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.703356 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.703434 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.703483 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.703529 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.703579 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.703627 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.703978 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704033 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704082 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704129 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704176 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704222 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704269 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704314 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704361 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704410 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704469 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704522 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704575 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704621 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704668 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704718 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704764 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704810 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704887 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.704935 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.704985 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705030 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705078 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705126 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705175 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705221 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705267 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705317 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705365 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705411 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705460 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705505 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705554 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705604 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705651 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 17 00:45:49.705697 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 17 00:45:49.705746 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 00:45:49.705793 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 17 00:45:49.705839 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 17 00:45:49.705899 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 17 00:45:49.705947 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:45:49.705998 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 17 00:45:49.706065 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 17 00:45:49.706417 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 17 00:45:49.706473 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 17 00:45:49.706523 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:45:49.706870 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 17 00:45:49.706931 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 17 00:45:49.706986 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 17 00:45:49.707190 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:45:49.707245 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 17 00:45:49.707294 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 17 00:45:49.707613 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 17 00:45:49.707676 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:45:49.707726 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 17 00:45:49.707774 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 17 00:45:49.707821 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:45:49.707919 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 17 00:45:49.707972 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 17 00:45:49.708020 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:45:49.708352 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 17 00:45:49.708408 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 17 00:45:49.708456 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:45:49.708507 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 17 00:45:49.708554 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 17 00:45:49.708602 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:45:49.708654 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 17 00:45:49.708712 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 17 00:45:49.708773 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:45:49.708838 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 17 00:45:49.708947 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 17 00:45:49.708996 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 17 00:45:49.709049 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 17 00:45:49.709096 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:45:49.709143 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 17 00:45:49.709189 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 17 00:45:49.709235 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 17 00:45:49.709281 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:45:49.709329 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 17 00:45:49.709375 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 17 00:45:49.709429 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 17 00:45:49.709494 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:45:49.709547 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 17 00:45:49.709597 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 17 00:45:49.709650 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:45:49.709700 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 17 00:45:49.709749 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 17 00:45:49.709798 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:45:49.709847 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 17 00:45:49.709915 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 17 00:45:49.709961 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:45:49.710011 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 17 00:45:49.710337 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 17 00:45:49.710395 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:45:49.710449 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 17 00:45:49.710777 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 17 00:45:49.710836 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:45:49.710910 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 17 00:45:49.711131 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 17 00:45:49.711200 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 17 00:45:49.711259 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:45:49.711598 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 17 00:45:49.711662 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 17 00:45:49.711728 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 17 00:45:49.711783 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:45:49.711937 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 17 00:45:49.711989 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 17 00:45:49.712043 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 17 00:45:49.712369 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:45:49.712424 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 17 00:45:49.712479 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 17 00:45:49.712528 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:45:49.712576 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 17 00:45:49.712624 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 17 00:45:49.712670 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:45:49.712717 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 17 00:45:49.712763 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 17 00:45:49.712809 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:45:49.712905 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 17 00:45:49.712969 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 17 00:45:49.713045 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:45:49.713112 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 17 00:45:49.713276 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 17 00:45:49.713331 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:45:49.713380 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 17 00:45:49.713708 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 17 00:45:49.713768 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 17 00:45:49.713823 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:45:49.713891 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 17 00:45:49.713947 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 17 00:45:49.713998 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 17 00:45:49.714045 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:45:49.714091 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 17 00:45:49.714137 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 17 00:45:49.714189 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:45:49.714237 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 17 00:45:49.714282 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 17 00:45:49.714328 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:45:49.714377 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 17 00:45:49.714423 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 17 00:45:49.714469 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:45:49.714516 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 17 00:45:49.714572 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 17 00:45:49.714620 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:45:49.714667 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 17 00:45:49.714713 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 17 00:45:49.714763 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:45:49.714811 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 17 00:45:49.714887 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 17 00:45:49.714935 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:45:49.714982 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 17 00:45:49.715029 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 17 00:45:49.715071 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 17 00:45:49.715112 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 17 00:45:49.715153 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 17 00:45:49.715198 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 17 00:45:49.715244 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 17 00:45:49.715287 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:45:49.715330 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 17 00:45:49.715372 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 17 00:45:49.715425 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 17 00:45:49.715477 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 17 00:45:49.715530 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 17 00:45:49.715592 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 17 00:45:49.715650 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 17 00:45:49.715698 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:45:49.715747 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 17 00:45:49.715791 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 17 00:45:49.715835 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:45:49.715894 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 17 00:45:49.715947 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 17 00:45:49.715990 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:45:49.716038 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 17 00:45:49.716082 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:45:49.716128 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 17 00:45:49.716172 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:45:49.716223 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 17 00:45:49.716266 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:45:49.716319 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 17 00:45:49.716372 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:45:49.716434 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 17 00:45:49.716492 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:45:49.716552 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 17 00:45:49.716598 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 17 00:45:49.716641 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:45:49.716689 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 17 00:45:49.716732 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 17 00:45:49.716780 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:45:49.716837 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 17 00:45:49.716908 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 17 00:45:49.716963 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:45:49.717047 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 17 00:45:49.717095 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:45:49.717145 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 17 00:45:49.717196 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:45:49.717280 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 17 00:45:49.717332 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:45:49.717383 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 17 00:45:49.717428 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:45:49.717476 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 17 00:45:49.717520 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:45:49.717575 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 17 00:45:49.717621 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 17 00:45:49.717668 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:45:49.717716 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 17 00:45:49.717760 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 17 00:45:49.717813 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:45:49.717879 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 17 00:45:49.717930 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 17 00:45:49.717974 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:45:49.718169 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 17 00:45:49.718232 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:45:49.718296 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 17 00:45:49.718654 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:45:49.718725 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 17 00:45:49.718784 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:45:49.718836 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 17 00:45:49.719063 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:45:49.719119 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 17 00:45:49.719437 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:45:49.719495 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 17 00:45:49.719544 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 17 00:45:49.719588 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:45:49.719884 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 17 00:45:49.719942 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 17 00:45:49.720009 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:45:49.720100 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 17 00:45:49.720364 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:45:49.720420 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 17 00:45:49.720465 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:45:49.720538 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 17 00:45:49.721556 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:45:49.721962 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 17 00:45:49.722022 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:45:49.722074 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 17 00:45:49.722124 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:45:49.722465 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 17 00:45:49.722518 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:45:49.722574 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:45:49.722586 kernel: PCI: CLS 32 bytes, default 64 May 17 00:45:49.722594 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:45:49.722601 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 17 00:45:49.722742 kernel: clocksource: Switched to clocksource tsc May 17 00:45:49.722749 kernel: Initialise system trusted keyrings May 17 00:45:49.722755 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:45:49.722761 kernel: Key type asymmetric registered May 17 00:45:49.722767 kernel: Asymmetric key parser 'x509' registered May 17 00:45:49.722775 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:45:49.722782 kernel: io scheduler mq-deadline registered May 17 00:45:49.722789 kernel: io scheduler kyber registered May 17 00:45:49.722795 kernel: io scheduler bfq registered May 17 00:45:49.722884 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 17 00:45:49.723120 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.723175 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 17 00:45:49.723225 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.723291 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 17 00:45:49.723352 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.723401 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 17 00:45:49.723449 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.723498 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 17 00:45:49.723563 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.723628 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 17 00:45:49.723702 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.723760 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 17 00:45:49.723814 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.724115 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 17 00:45:49.724354 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.724418 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 17 00:45:49.724468 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.724517 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 17 00:45:49.724570 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.724622 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 17 00:45:49.724673 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.724721 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 17 00:45:49.724771 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.724820 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 17 00:45:49.725130 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.725187 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 17 00:45:49.725333 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.725402 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 17 00:45:49.725458 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.725694 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 17 00:45:49.725749 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.725800 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 17 00:45:49.725849 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.725909 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 17 00:45:49.725961 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726011 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 17 00:45:49.726059 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726114 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 17 00:45:49.726162 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726212 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 17 00:45:49.726264 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726314 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 17 00:45:49.726361 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726410 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 17 00:45:49.726458 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726508 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 17 00:45:49.726568 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726617 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 17 00:45:49.726664 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726712 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 17 00:45:49.726759 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726813 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 17 00:45:49.726873 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.726956 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 17 00:45:49.727286 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.727522 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 17 00:45:49.727581 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.727632 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 17 00:45:49.727687 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.727736 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 17 00:45:49.727791 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.727890 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 17 00:45:49.727957 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:45:49.727972 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:45:49.727981 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:45:49.727987 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:45:49.727993 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 17 00:45:49.727999 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:45:49.728006 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:45:49.728076 kernel: rtc_cmos 00:01: registered as rtc0 May 17 00:45:49.728157 kernel: rtc_cmos 00:01: setting system clock to 2025-05-17T00:45:49 UTC (1747442749) May 17 00:45:49.728744 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 17 00:45:49.728756 kernel: intel_pstate: CPU model not supported May 17 00:45:49.728763 kernel: NET: Registered PF_INET6 protocol family May 17 00:45:49.728773 kernel: Segment Routing with IPv6 May 17 00:45:49.728779 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:45:49.728786 kernel: NET: Registered PF_PACKET protocol family May 17 00:45:49.728792 kernel: Key type dns_resolver registered May 17 00:45:49.728801 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:45:49.728808 kernel: IPI shorthand broadcast: enabled May 17 00:45:49.728814 kernel: sched_clock: Marking stable (842062503, 229403863)->(1136462675, -64996309) May 17 00:45:49.728820 kernel: registered taskstats version 1 May 17 00:45:49.728826 kernel: Loading compiled-in X.509 certificates May 17 00:45:49.728923 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:45:49.728931 kernel: Key type .fscrypt registered May 17 00:45:49.728937 kernel: Key type fscrypt-provisioning registered May 17 00:45:49.728945 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:45:49.728951 kernel: ima: Allocated hash algorithm: sha1 May 17 00:45:49.728958 kernel: ima: No architecture policies found May 17 00:45:49.728964 kernel: clk: Disabling unused clocks May 17 00:45:49.728970 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:45:49.728977 kernel: Write protecting the kernel read-only data: 28672k May 17 00:45:49.728983 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:45:49.728989 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:45:49.728995 kernel: Run /init as init process May 17 00:45:49.729002 kernel: with arguments: May 17 00:45:49.729009 kernel: /init May 17 00:45:49.729015 kernel: with environment: May 17 00:45:49.729021 kernel: HOME=/ May 17 00:45:49.729026 kernel: TERM=linux May 17 00:45:49.729032 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:45:49.729040 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:45:49.729047 systemd[1]: Detected virtualization vmware. May 17 00:45:49.729055 systemd[1]: Detected architecture x86-64. May 17 00:45:49.729061 systemd[1]: Running in initrd. May 17 00:45:49.729067 systemd[1]: No hostname configured, using default hostname. May 17 00:45:49.729073 systemd[1]: Hostname set to . May 17 00:45:49.729079 systemd[1]: Initializing machine ID from random generator. May 17 00:45:49.729085 systemd[1]: Queued start job for default target initrd.target. May 17 00:45:49.729091 systemd[1]: Started systemd-ask-password-console.path. May 17 00:45:49.729097 systemd[1]: Reached target cryptsetup.target. May 17 00:45:49.729103 systemd[1]: Reached target paths.target. May 17 00:45:49.729110 systemd[1]: Reached target slices.target. May 17 00:45:49.729117 systemd[1]: Reached target swap.target. May 17 00:45:49.729123 systemd[1]: Reached target timers.target. May 17 00:45:49.729129 systemd[1]: Listening on iscsid.socket. May 17 00:45:49.729136 systemd[1]: Listening on iscsiuio.socket. May 17 00:45:49.729143 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:45:49.729149 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:45:49.729156 systemd[1]: Listening on systemd-journald.socket. May 17 00:45:49.729163 systemd[1]: Listening on systemd-networkd.socket. May 17 00:45:49.729169 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:45:49.729176 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:45:49.729182 systemd[1]: Reached target sockets.target. May 17 00:45:49.729188 systemd[1]: Starting kmod-static-nodes.service... May 17 00:45:49.729195 systemd[1]: Finished network-cleanup.service. May 17 00:45:49.729201 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:45:49.729207 systemd[1]: Starting systemd-journald.service... May 17 00:45:49.729214 systemd[1]: Starting systemd-modules-load.service... May 17 00:45:49.729220 systemd[1]: Starting systemd-resolved.service... May 17 00:45:49.729226 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:45:49.729233 systemd[1]: Finished kmod-static-nodes.service. May 17 00:45:49.729239 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:45:49.729246 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:45:49.729252 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:45:49.729258 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:45:49.729264 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:45:49.729271 kernel: audit: type=1130 audit(1747442749.662:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.729277 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:45:49.729284 kernel: audit: type=1130 audit(1747442749.684:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.729290 systemd[1]: Starting dracut-cmdline.service... May 17 00:45:49.729296 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:45:49.729303 systemd[1]: Started systemd-resolved.service. May 17 00:45:49.729309 systemd[1]: Reached target nss-lookup.target. May 17 00:45:49.729317 kernel: audit: type=1130 audit(1747442749.693:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.729323 kernel: Bridge firewalling registered May 17 00:45:49.729329 kernel: SCSI subsystem initialized May 17 00:45:49.729338 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:45:49.729349 systemd-journald[217]: Journal started May 17 00:45:49.729383 systemd-journald[217]: Runtime Journal (/run/log/journal/fd98865a1f674109ba9f09a94d5f3a09) is 4.8M, max 38.8M, 34.0M free. May 17 00:45:49.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.652262 systemd-modules-load[218]: Inserted module 'overlay' May 17 00:45:49.733742 systemd[1]: Started systemd-journald.service. May 17 00:45:49.733756 kernel: device-mapper: uevent: version 1.0.3 May 17 00:45:49.733769 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:45:49.684922 systemd-resolved[219]: Positive Trust Anchors: May 17 00:45:49.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.684931 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:45:49.736927 kernel: audit: type=1130 audit(1747442749.732:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.684950 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:45:49.691951 systemd-resolved[219]: Defaulting to hostname 'linux'. May 17 00:45:49.702093 systemd-modules-load[218]: Inserted module 'br_netfilter' May 17 00:45:49.738236 dracut-cmdline[234]: dracut-dracut-053 May 17 00:45:49.738236 dracut-cmdline[234]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 17 00:45:49.738236 dracut-cmdline[234]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:45:49.739331 systemd-modules-load[218]: Inserted module 'dm_multipath' May 17 00:45:49.740131 systemd[1]: Finished systemd-modules-load.service. May 17 00:45:49.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.740603 systemd[1]: Starting systemd-sysctl.service... May 17 00:45:49.743881 kernel: audit: type=1130 audit(1747442749.738:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.746653 systemd[1]: Finished systemd-sysctl.service. May 17 00:45:49.749270 kernel: audit: type=1130 audit(1747442749.744:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.759866 kernel: Loading iSCSI transport class v2.0-870. May 17 00:45:49.771869 kernel: iscsi: registered transport (tcp) May 17 00:45:49.787869 kernel: iscsi: registered transport (qla4xxx) May 17 00:45:49.787900 kernel: QLogic iSCSI HBA Driver May 17 00:45:49.803683 systemd[1]: Finished dracut-cmdline.service. May 17 00:45:49.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.804299 systemd[1]: Starting dracut-pre-udev.service... May 17 00:45:49.807056 kernel: audit: type=1130 audit(1747442749.801:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:49.841862 kernel: raid6: avx2x4 gen() 48199 MB/s May 17 00:45:49.857863 kernel: raid6: avx2x4 xor() 22126 MB/s May 17 00:45:49.874864 kernel: raid6: avx2x2 gen() 52010 MB/s May 17 00:45:49.891868 kernel: raid6: avx2x2 xor() 30663 MB/s May 17 00:45:49.908878 kernel: raid6: avx2x1 gen() 41657 MB/s May 17 00:45:49.925866 kernel: raid6: avx2x1 xor() 25087 MB/s May 17 00:45:49.942870 kernel: raid6: sse2x4 gen() 20603 MB/s May 17 00:45:49.959872 kernel: raid6: sse2x4 xor() 11759 MB/s May 17 00:45:49.976866 kernel: raid6: sse2x2 gen() 20748 MB/s May 17 00:45:49.993890 kernel: raid6: sse2x2 xor() 13447 MB/s May 17 00:45:50.010872 kernel: raid6: sse2x1 gen() 17882 MB/s May 17 00:45:50.028080 kernel: raid6: sse2x1 xor() 8833 MB/s May 17 00:45:50.028128 kernel: raid6: using algorithm avx2x2 gen() 52010 MB/s May 17 00:45:50.028139 kernel: raid6: .... xor() 30663 MB/s, rmw enabled May 17 00:45:50.029221 kernel: raid6: using avx2x2 recovery algorithm May 17 00:45:50.037866 kernel: xor: automatically using best checksumming function avx May 17 00:45:50.098873 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:45:50.103396 systemd[1]: Finished dracut-pre-udev.service. May 17 00:45:50.104147 systemd[1]: Starting systemd-udevd.service... May 17 00:45:50.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:50.101000 audit: BPF prog-id=7 op=LOAD May 17 00:45:50.108011 kernel: audit: type=1130 audit(1747442750.101:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:50.108036 kernel: audit: type=1334 audit(1747442750.101:10): prog-id=7 op=LOAD May 17 00:45:50.102000 audit: BPF prog-id=8 op=LOAD May 17 00:45:50.115842 systemd-udevd[416]: Using default interface naming scheme 'v252'. May 17 00:45:50.118488 systemd[1]: Started systemd-udevd.service. May 17 00:45:50.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:50.119073 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:45:50.126287 dracut-pre-trigger[417]: rd.md=0: removing MD RAID activation May 17 00:45:50.142085 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:45:50.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:50.142614 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:45:50.205793 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:45:50.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:50.256863 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 17 00:45:50.261659 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 17 00:45:50.261679 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 17 00:45:50.274137 kernel: vmw_pvscsi: using 64bit dma May 17 00:45:50.274149 kernel: vmw_pvscsi: max_id: 16 May 17 00:45:50.274156 kernel: vmw_pvscsi: setting ring_pages to 8 May 17 00:45:50.274169 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 17 00:45:50.281933 kernel: vmw_pvscsi: enabling reqCallThreshold May 17 00:45:50.281956 kernel: vmw_pvscsi: driver-based request coalescing enabled May 17 00:45:50.281965 kernel: vmw_pvscsi: using MSI-X May 17 00:45:50.281972 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 17 00:45:50.283557 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 17 00:45:50.286354 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 17 00:45:50.286421 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 17 00:45:50.288875 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:45:50.295865 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:45:50.295883 kernel: AES CTR mode by8 optimization enabled May 17 00:45:50.299174 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 17 00:45:50.312743 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:45:50.312816 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 17 00:45:50.312900 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 17 00:45:50.312967 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 17 00:45:50.313024 kernel: libata version 3.00 loaded. May 17 00:45:50.313032 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:45:50.313040 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:45:50.315867 kernel: ata_piix 0000:00:07.1: version 2.13 May 17 00:45:50.320427 kernel: scsi host1: ata_piix May 17 00:45:50.320535 kernel: scsi host2: ata_piix May 17 00:45:50.320614 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 17 00:45:50.320623 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 17 00:45:50.343866 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (468) May 17 00:45:50.346157 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:45:50.348455 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:45:50.350216 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:45:50.350461 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:45:50.353227 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:45:50.353915 systemd[1]: Starting disk-uuid.service... May 17 00:45:50.380867 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:45:50.384225 kernel: GPT:disk_guids don't match. May 17 00:45:50.384250 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:45:50.384258 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:45:50.487943 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 17 00:45:50.492874 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 17 00:45:50.521948 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 17 00:45:50.545983 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:45:50.545995 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 17 00:45:51.390340 disk-uuid[538]: The operation has completed successfully. May 17 00:45:51.390885 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:45:51.484462 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:45:51.484782 systemd[1]: Finished disk-uuid.service. May 17 00:45:51.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.487704 systemd[1]: Starting verity-setup.service... May 17 00:45:51.498870 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:45:51.589249 systemd[1]: Found device dev-mapper-usr.device. May 17 00:45:51.589757 systemd[1]: Mounting sysusr-usr.mount... May 17 00:45:51.591095 systemd[1]: Finished verity-setup.service. May 17 00:45:51.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.655871 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:45:51.656030 systemd[1]: Mounted sysusr-usr.mount. May 17 00:45:51.656610 systemd[1]: Starting afterburn-network-kargs.service... May 17 00:45:51.657063 systemd[1]: Starting ignition-setup.service... May 17 00:45:51.702336 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:45:51.702381 kernel: BTRFS info (device sda6): using free space tree May 17 00:45:51.702395 kernel: BTRFS info (device sda6): has skinny extents May 17 00:45:51.708871 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:45:51.714870 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:45:51.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.720405 systemd[1]: Finished ignition-setup.service. May 17 00:45:51.721107 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:45:51.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.812364 systemd[1]: Finished afterburn-network-kargs.service. May 17 00:45:51.813013 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:45:51.862155 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:45:51.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.860000 audit: BPF prog-id=9 op=LOAD May 17 00:45:51.863077 systemd[1]: Starting systemd-networkd.service... May 17 00:45:51.876786 systemd-networkd[734]: lo: Link UP May 17 00:45:51.877038 systemd-networkd[734]: lo: Gained carrier May 17 00:45:51.877431 systemd-networkd[734]: Enumeration completed May 17 00:45:51.877608 systemd[1]: Started systemd-networkd.service. May 17 00:45:51.877780 systemd[1]: Reached target network.target. May 17 00:45:51.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.878081 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 17 00:45:51.878400 systemd[1]: Starting iscsiuio.service... May 17 00:45:51.881661 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 17 00:45:51.881814 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 17 00:45:51.882259 systemd-networkd[734]: ens192: Link UP May 17 00:45:51.882435 systemd-networkd[734]: ens192: Gained carrier May 17 00:45:51.882877 systemd[1]: Started iscsiuio.service. May 17 00:45:51.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.883500 systemd[1]: Starting iscsid.service... May 17 00:45:51.885692 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:45:51.885692 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:45:51.885692 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:45:51.885692 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:45:51.885692 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:45:51.885692 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:45:51.886899 systemd[1]: Started iscsid.service. May 17 00:45:51.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.887446 systemd[1]: Starting dracut-initqueue.service... May 17 00:45:51.893912 systemd[1]: Finished dracut-initqueue.service. May 17 00:45:51.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.894262 systemd[1]: Reached target remote-fs-pre.target. May 17 00:45:51.894472 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:45:51.894685 systemd[1]: Reached target remote-fs.target. May 17 00:45:51.895639 systemd[1]: Starting dracut-pre-mount.service... May 17 00:45:51.900964 systemd[1]: Finished dracut-pre-mount.service. May 17 00:45:51.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.938913 ignition[606]: Ignition 2.14.0 May 17 00:45:51.938922 ignition[606]: Stage: fetch-offline May 17 00:45:51.938955 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:45:51.938980 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:45:51.941939 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:45:51.942022 ignition[606]: parsed url from cmdline: "" May 17 00:45:51.942025 ignition[606]: no config URL provided May 17 00:45:51.942027 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:45:51.942032 ignition[606]: no config at "/usr/lib/ignition/user.ign" May 17 00:45:51.948042 ignition[606]: config successfully fetched May 17 00:45:51.948072 ignition[606]: parsing config with SHA512: 99d89b3677e2b31c4f6ab8515953e63f47ede3b272ea079d46235246c36b0f693e707c38cf2572d176233a81f6e02d00a202cbee71f237dfe10b5177a7e27e2c May 17 00:45:51.954167 unknown[606]: fetched base config from "system" May 17 00:45:51.954174 unknown[606]: fetched user config from "vmware" May 17 00:45:51.954585 ignition[606]: fetch-offline: fetch-offline passed May 17 00:45:51.954633 ignition[606]: Ignition finished successfully May 17 00:45:51.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.955324 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:45:51.955477 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 00:45:51.956009 systemd[1]: Starting ignition-kargs.service... May 17 00:45:51.961890 ignition[754]: Ignition 2.14.0 May 17 00:45:51.962163 ignition[754]: Stage: kargs May 17 00:45:51.962345 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:45:51.962502 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:45:51.963885 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:45:51.965640 ignition[754]: kargs: kargs passed May 17 00:45:51.965681 ignition[754]: Ignition finished successfully May 17 00:45:51.966631 systemd[1]: Finished ignition-kargs.service. May 17 00:45:51.967230 systemd[1]: Starting ignition-disks.service... May 17 00:45:51.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.971738 ignition[760]: Ignition 2.14.0 May 17 00:45:51.971999 ignition[760]: Stage: disks May 17 00:45:51.972180 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:45:51.972336 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:45:51.973709 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:45:51.975261 ignition[760]: disks: disks passed May 17 00:45:51.975406 ignition[760]: Ignition finished successfully May 17 00:45:51.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:51.976074 systemd[1]: Finished ignition-disks.service. May 17 00:45:51.976230 systemd[1]: Reached target initrd-root-device.target. May 17 00:45:51.976342 systemd[1]: Reached target local-fs-pre.target. May 17 00:45:51.976444 systemd[1]: Reached target local-fs.target. May 17 00:45:51.976524 systemd[1]: Reached target sysinit.target. May 17 00:45:51.976603 systemd[1]: Reached target basic.target. May 17 00:45:51.977200 systemd[1]: Starting systemd-fsck-root.service... May 17 00:45:52.016412 systemd-fsck[768]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 17 00:45:52.018294 systemd[1]: Finished systemd-fsck-root.service. May 17 00:45:52.018971 systemd[1]: Mounting sysroot.mount... May 17 00:45:52.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:52.027867 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:45:52.028044 systemd[1]: Mounted sysroot.mount. May 17 00:45:52.028350 systemd[1]: Reached target initrd-root-fs.target. May 17 00:45:52.029479 systemd[1]: Mounting sysroot-usr.mount... May 17 00:45:52.030108 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:45:52.030298 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:45:52.030534 systemd[1]: Reached target ignition-diskful.target. May 17 00:45:52.031924 systemd[1]: Mounted sysroot-usr.mount. May 17 00:45:52.032641 systemd[1]: Starting initrd-setup-root.service... May 17 00:45:52.036643 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:45:52.040769 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory May 17 00:45:52.043528 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:45:52.046342 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:45:52.100784 systemd[1]: Finished initrd-setup-root.service. May 17 00:45:52.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:52.101385 systemd[1]: Starting ignition-mount.service... May 17 00:45:52.101874 systemd[1]: Starting sysroot-boot.service... May 17 00:45:52.105395 bash[819]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:45:52.110928 ignition[820]: INFO : Ignition 2.14.0 May 17 00:45:52.111216 ignition[820]: INFO : Stage: mount May 17 00:45:52.111390 ignition[820]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:45:52.111548 ignition[820]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:45:52.113188 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:45:52.114767 ignition[820]: INFO : mount: mount passed May 17 00:45:52.114906 ignition[820]: INFO : Ignition finished successfully May 17 00:45:52.115459 systemd[1]: Finished ignition-mount.service. May 17 00:45:52.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:52.157504 systemd[1]: Finished sysroot-boot.service. May 17 00:45:52.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:52.604885 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:45:52.635875 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (829) May 17 00:45:52.645037 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:45:52.645064 kernel: BTRFS info (device sda6): using free space tree May 17 00:45:52.645073 kernel: BTRFS info (device sda6): has skinny extents May 17 00:45:52.670863 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:45:52.671929 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:45:52.672627 systemd[1]: Starting ignition-files.service... May 17 00:45:52.682265 ignition[849]: INFO : Ignition 2.14.0 May 17 00:45:52.682265 ignition[849]: INFO : Stage: files May 17 00:45:52.682615 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:45:52.682615 ignition[849]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:45:52.683857 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:45:52.686105 ignition[849]: DEBUG : files: compiled without relabeling support, skipping May 17 00:45:52.686643 ignition[849]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:45:52.686643 ignition[849]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:45:52.688639 ignition[849]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:45:52.688883 ignition[849]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:45:52.689749 unknown[849]: wrote ssh authorized keys file for user: core May 17 00:45:52.690005 ignition[849]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:45:52.690289 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:45:52.690473 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 17 00:45:52.790352 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:45:53.000886 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:45:53.001203 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:45:53.001203 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:45:53.001203 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:45:53.001203 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:45:53.001203 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:45:53.002005 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:45:53.003205 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 17 00:45:53.003205 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:45:53.006305 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2921355774" May 17 00:45:53.006555 ignition[849]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2921355774": device or resource busy May 17 00:45:53.006767 ignition[849]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2921355774", trying btrfs: device or resource busy May 17 00:45:53.006997 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2921355774" May 17 00:45:53.008590 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2921355774" May 17 00:45:53.022022 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2921355774" May 17 00:45:53.023273 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2921355774" May 17 00:45:53.023273 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 17 00:45:53.023273 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:45:53.023273 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:45:53.023024 systemd[1]: mnt-oem2921355774.mount: Deactivated successfully. May 17 00:45:53.209065 systemd-networkd[734]: ens192: Gained IPv6LL May 17 00:45:53.638597 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:45:54.637296 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:45:54.637676 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 17 00:45:54.637676 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 17 00:45:54.637676 ignition[849]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 17 00:45:54.637676 ignition[849]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" May 17 00:45:54.639313 ignition[849]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:45:54.690418 ignition[849]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:45:54.690645 ignition[849]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" May 17 00:45:54.690645 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:45:54.690645 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:45:54.690645 ignition[849]: INFO : files: files passed May 17 00:45:54.690645 ignition[849]: INFO : Ignition finished successfully May 17 00:45:54.691882 systemd[1]: Finished ignition-files.service. May 17 00:45:54.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.692486 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:45:54.695332 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:45:54.695349 kernel: audit: type=1130 audit(1747442754.690:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.695244 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:45:54.695721 systemd[1]: Starting ignition-quench.service... May 17 00:45:54.698452 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:45:54.698510 systemd[1]: Finished ignition-quench.service. May 17 00:45:54.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.699490 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:45:54.703640 kernel: audit: type=1130 audit(1747442754.696:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.703656 kernel: audit: type=1131 audit(1747442754.696:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.699415 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:45:54.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.704049 systemd[1]: Reached target ignition-complete.target. May 17 00:45:54.706873 kernel: audit: type=1130 audit(1747442754.702:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.707149 systemd[1]: Starting initrd-parse-etc.service... May 17 00:45:54.716152 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:45:54.716396 systemd[1]: Finished initrd-parse-etc.service. May 17 00:45:54.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.716748 systemd[1]: Reached target initrd-fs.target. May 17 00:45:54.721435 kernel: audit: type=1130 audit(1747442754.714:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.721452 kernel: audit: type=1131 audit(1747442754.714:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.721620 systemd[1]: Reached target initrd.target. May 17 00:45:54.721882 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:45:54.722575 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:45:54.729454 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:45:54.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.730268 systemd[1]: Starting initrd-cleanup.service... May 17 00:45:54.733018 kernel: audit: type=1130 audit(1747442754.727:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.737603 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:45:54.737674 systemd[1]: Finished initrd-cleanup.service. May 17 00:45:54.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.738363 systemd[1]: Stopped target nss-lookup.target. May 17 00:45:54.742907 kernel: audit: type=1130 audit(1747442754.736:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.742926 kernel: audit: type=1131 audit(1747442754.736:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.742808 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:45:54.742980 systemd[1]: Stopped target timers.target. May 17 00:45:54.743173 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:45:54.745781 kernel: audit: type=1131 audit(1747442754.741:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.743211 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:45:54.743351 systemd[1]: Stopped target initrd.target. May 17 00:45:54.745837 systemd[1]: Stopped target basic.target. May 17 00:45:54.746003 systemd[1]: Stopped target ignition-complete.target. May 17 00:45:54.746161 systemd[1]: Stopped target ignition-diskful.target. May 17 00:45:54.746317 systemd[1]: Stopped target initrd-root-device.target. May 17 00:45:54.746486 systemd[1]: Stopped target remote-fs.target. May 17 00:45:54.746640 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:45:54.746821 systemd[1]: Stopped target sysinit.target. May 17 00:45:54.746974 systemd[1]: Stopped target local-fs.target. May 17 00:45:54.747134 systemd[1]: Stopped target local-fs-pre.target. May 17 00:45:54.747289 systemd[1]: Stopped target swap.target. May 17 00:45:54.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.747443 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:45:54.747474 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:45:54.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.747629 systemd[1]: Stopped target cryptsetup.target. May 17 00:45:54.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.747761 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:45:54.747783 systemd[1]: Stopped dracut-initqueue.service. May 17 00:45:54.747965 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:45:54.747985 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:45:54.748109 systemd[1]: Stopped target paths.target. May 17 00:45:54.748249 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:45:54.751894 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:45:54.752041 systemd[1]: Stopped target slices.target. May 17 00:45:54.752206 systemd[1]: Stopped target sockets.target. May 17 00:45:54.752407 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:45:54.752427 systemd[1]: Closed iscsid.socket. May 17 00:45:54.752570 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:45:54.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.752589 systemd[1]: Closed iscsiuio.socket. May 17 00:45:54.752754 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:45:54.752783 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:45:54.752955 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:45:54.752976 systemd[1]: Stopped ignition-files.service. May 17 00:45:54.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.753536 systemd[1]: Stopping ignition-mount.service... May 17 00:45:54.754128 systemd[1]: Stopping sysroot-boot.service... May 17 00:45:54.754241 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:45:54.754273 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:45:54.754405 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:45:54.754427 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:45:54.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.759330 ignition[888]: INFO : Ignition 2.14.0 May 17 00:45:54.759330 ignition[888]: INFO : Stage: umount May 17 00:45:54.759330 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:45:54.759330 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:45:54.760692 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:45:54.762917 ignition[888]: INFO : umount: umount passed May 17 00:45:54.762917 ignition[888]: INFO : Ignition finished successfully May 17 00:45:54.763355 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:45:54.763423 systemd[1]: Stopped ignition-mount.service. May 17 00:45:54.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.766604 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:45:54.766784 systemd[1]: Stopped target network.target. May 17 00:45:54.766883 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:45:54.766907 systemd[1]: Stopped ignition-disks.service. May 17 00:45:54.767008 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:45:54.767027 systemd[1]: Stopped ignition-kargs.service. May 17 00:45:54.767132 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:45:54.767152 systemd[1]: Stopped ignition-setup.service. May 17 00:45:54.767308 systemd[1]: Stopping systemd-networkd.service... May 17 00:45:54.767433 systemd[1]: Stopping systemd-resolved.service... May 17 00:45:54.768394 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:45:54.768485 systemd[1]: Stopped systemd-networkd.service. May 17 00:45:54.768729 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:45:54.768748 systemd[1]: Closed systemd-networkd.socket. May 17 00:45:54.769239 systemd[1]: Stopping network-cleanup.service... May 17 00:45:54.769327 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:45:54.769353 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:45:54.769480 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 17 00:45:54.769502 systemd[1]: Stopped afterburn-network-kargs.service. May 17 00:45:54.769607 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:45:54.769631 systemd[1]: Stopped systemd-sysctl.service. May 17 00:45:54.770513 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:45:54.770536 systemd[1]: Stopped systemd-modules-load.service. May 17 00:45:54.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.772000 audit: BPF prog-id=9 op=UNLOAD May 17 00:45:54.773125 systemd[1]: Stopping systemd-udevd.service... May 17 00:45:54.774651 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:45:54.775088 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:45:54.775137 systemd[1]: Stopped systemd-resolved.service. May 17 00:45:54.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.777656 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:45:54.777710 systemd[1]: Stopped network-cleanup.service. May 17 00:45:54.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.779756 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:45:54.779828 systemd[1]: Stopped systemd-udevd.service. May 17 00:45:54.778000 audit: BPF prog-id=6 op=UNLOAD May 17 00:45:54.780170 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:45:54.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.780195 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:45:54.780464 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:45:54.780482 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:45:54.780617 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:45:54.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.780638 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:45:54.780891 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:45:54.780911 systemd[1]: Stopped dracut-cmdline.service. May 17 00:45:54.781031 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:45:54.781050 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:45:54.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.781586 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:45:54.782915 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:45:54.782945 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:45:54.783640 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:45:54.783666 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:45:54.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.783768 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:45:54.783789 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:45:54.784523 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:45:54.785134 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:45:54.785183 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:45:54.803734 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:45:54.803795 systemd[1]: Stopped sysroot-boot.service. May 17 00:45:54.804057 systemd[1]: Reached target initrd-switch-root.target. May 17 00:45:54.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.804165 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:45:54.804190 systemd[1]: Stopped initrd-setup-root.service. May 17 00:45:54.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:54.804749 systemd[1]: Starting initrd-switch-root.service... May 17 00:45:54.811280 systemd[1]: Switching root. May 17 00:45:54.829046 iscsid[739]: iscsid shutting down. May 17 00:45:54.829240 systemd-journald[217]: Journal stopped May 17 00:45:56.975825 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). May 17 00:45:56.975842 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:45:56.975857 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:45:56.975863 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:45:56.975869 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:45:56.975875 kernel: SELinux: policy capability open_perms=1 May 17 00:45:56.975881 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:45:56.975887 kernel: SELinux: policy capability always_check_network=0 May 17 00:45:56.975892 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:45:56.975898 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:45:56.975903 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:45:56.975909 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:45:56.975916 systemd[1]: Successfully loaded SELinux policy in 37.803ms. May 17 00:45:56.975923 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.143ms. May 17 00:45:56.975931 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:45:56.975937 systemd[1]: Detected virtualization vmware. May 17 00:45:56.975945 systemd[1]: Detected architecture x86-64. May 17 00:45:56.975951 systemd[1]: Detected first boot. May 17 00:45:56.975958 systemd[1]: Initializing machine ID from random generator. May 17 00:45:56.975964 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:45:56.975971 systemd[1]: Populated /etc with preset unit settings. May 17 00:45:56.975977 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:45:56.975984 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:45:56.975991 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:45:56.975999 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:45:56.976006 systemd[1]: Stopped iscsiuio.service. May 17 00:45:56.976013 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:45:56.976019 systemd[1]: Stopped iscsid.service. May 17 00:45:56.976026 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:45:56.976032 systemd[1]: Stopped initrd-switch-root.service. May 17 00:45:56.976039 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:45:56.976047 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:45:56.976054 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:45:56.976060 systemd[1]: Created slice system-getty.slice. May 17 00:45:56.976067 systemd[1]: Created slice system-modprobe.slice. May 17 00:45:56.976074 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:45:56.976080 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:45:56.976086 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:45:56.976093 systemd[1]: Created slice user.slice. May 17 00:45:56.976119 systemd[1]: Started systemd-ask-password-console.path. May 17 00:45:56.976127 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:45:56.976136 systemd[1]: Set up automount boot.automount. May 17 00:45:56.976142 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:45:56.976149 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:45:56.976156 systemd[1]: Stopped target initrd-fs.target. May 17 00:45:56.976163 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:45:56.976170 systemd[1]: Reached target integritysetup.target. May 17 00:45:56.976177 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:45:56.976185 systemd[1]: Reached target remote-fs.target. May 17 00:45:56.976192 systemd[1]: Reached target slices.target. May 17 00:45:56.976198 systemd[1]: Reached target swap.target. May 17 00:45:56.976205 systemd[1]: Reached target torcx.target. May 17 00:45:56.976212 systemd[1]: Reached target veritysetup.target. May 17 00:45:56.976220 systemd[1]: Listening on systemd-coredump.socket. May 17 00:45:56.976228 systemd[1]: Listening on systemd-initctl.socket. May 17 00:45:56.976235 systemd[1]: Listening on systemd-networkd.socket. May 17 00:45:56.976242 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:45:56.976249 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:45:56.976257 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:45:56.976264 systemd[1]: Mounting dev-hugepages.mount... May 17 00:45:56.976271 systemd[1]: Mounting dev-mqueue.mount... May 17 00:45:56.976279 systemd[1]: Mounting media.mount... May 17 00:45:56.976286 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:56.976293 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:45:56.976300 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:45:56.976308 systemd[1]: Mounting tmp.mount... May 17 00:45:56.976315 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:45:56.976322 systemd[1]: Starting ignition-delete-config.service... May 17 00:45:56.976329 systemd[1]: Starting kmod-static-nodes.service... May 17 00:45:56.976337 systemd[1]: Starting modprobe@configfs.service... May 17 00:45:56.976345 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:45:56.976352 systemd[1]: Starting modprobe@drm.service... May 17 00:45:56.976359 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:45:56.976366 systemd[1]: Starting modprobe@fuse.service... May 17 00:45:56.976373 systemd[1]: Starting modprobe@loop.service... May 17 00:45:56.976381 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:45:56.976388 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:45:56.976395 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:45:56.976401 kernel: fuse: init (API version 7.34) May 17 00:45:56.976409 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:45:56.976416 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:45:56.976423 systemd[1]: Stopped systemd-journald.service. May 17 00:45:56.976430 systemd[1]: Starting systemd-journald.service... May 17 00:45:56.976438 systemd[1]: Starting systemd-modules-load.service... May 17 00:45:56.976446 systemd[1]: Starting systemd-network-generator.service... May 17 00:45:56.976452 systemd[1]: Starting systemd-remount-fs.service... May 17 00:45:56.976460 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:45:56.976467 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:45:56.976475 systemd[1]: Stopped verity-setup.service. May 17 00:45:56.976482 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:56.976489 systemd[1]: Mounted dev-hugepages.mount. May 17 00:45:56.976496 systemd[1]: Mounted dev-mqueue.mount. May 17 00:45:56.976503 systemd[1]: Mounted media.mount. May 17 00:45:56.976510 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:45:56.976517 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:45:56.976524 systemd[1]: Mounted tmp.mount. May 17 00:45:56.976533 systemd[1]: Finished kmod-static-nodes.service. May 17 00:45:56.976544 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:45:56.976551 systemd[1]: Finished modprobe@configfs.service. May 17 00:45:56.976558 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:45:56.976566 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:45:56.976573 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:45:56.976583 systemd-journald[1028]: Journal started May 17 00:45:56.976612 systemd-journald[1028]: Runtime Journal (/run/log/journal/2ee2a720aa7a4f179bc0254cdb1f8262) is 4.8M, max 38.8M, 34.0M free. May 17 00:45:55.069000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:45:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:45:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:45:55.140000 audit: BPF prog-id=10 op=LOAD May 17 00:45:55.140000 audit: BPF prog-id=10 op=UNLOAD May 17 00:45:55.140000 audit: BPF prog-id=11 op=LOAD May 17 00:45:55.140000 audit: BPF prog-id=11 op=UNLOAD May 17 00:45:55.220000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:45:55.220000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:55.220000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:45:55.222000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:45:55.222000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:56.979898 systemd[1]: Started systemd-journald.service. May 17 00:45:55.222000 audit: CWD cwd="/" May 17 00:45:55.222000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:55.222000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:55.222000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:45:56.854000 audit: BPF prog-id=12 op=LOAD May 17 00:45:56.854000 audit: BPF prog-id=3 op=UNLOAD May 17 00:45:56.854000 audit: BPF prog-id=13 op=LOAD May 17 00:45:56.854000 audit: BPF prog-id=14 op=LOAD May 17 00:45:56.854000 audit: BPF prog-id=4 op=UNLOAD May 17 00:45:56.854000 audit: BPF prog-id=5 op=UNLOAD May 17 00:45:56.856000 audit: BPF prog-id=15 op=LOAD May 17 00:45:56.856000 audit: BPF prog-id=12 op=UNLOAD May 17 00:45:56.856000 audit: BPF prog-id=16 op=LOAD May 17 00:45:56.856000 audit: BPF prog-id=17 op=LOAD May 17 00:45:56.856000 audit: BPF prog-id=13 op=UNLOAD May 17 00:45:56.856000 audit: BPF prog-id=14 op=UNLOAD May 17 00:45:56.857000 audit: BPF prog-id=18 op=LOAD May 17 00:45:56.857000 audit: BPF prog-id=15 op=UNLOAD May 17 00:45:56.857000 audit: BPF prog-id=19 op=LOAD May 17 00:45:56.857000 audit: BPF prog-id=20 op=LOAD May 17 00:45:56.857000 audit: BPF prog-id=16 op=UNLOAD May 17 00:45:56.857000 audit: BPF prog-id=17 op=UNLOAD May 17 00:45:56.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.863000 audit: BPF prog-id=18 op=UNLOAD May 17 00:45:56.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.938000 audit: BPF prog-id=21 op=LOAD May 17 00:45:56.938000 audit: BPF prog-id=22 op=LOAD May 17 00:45:56.938000 audit: BPF prog-id=23 op=LOAD May 17 00:45:56.938000 audit: BPF prog-id=20 op=UNLOAD May 17 00:45:56.939000 audit: BPF prog-id=19 op=UNLOAD May 17 00:45:56.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.971000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:45:56.971000 audit[1028]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc4399ead0 a2=4000 a3=7ffc4399eb6c items=0 ppid=1 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:56.971000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:45:56.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.855327 systemd[1]: Queued start job for default target multi-user.target. May 17 00:45:55.219752 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:45:56.855335 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:45:55.220192 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:45:56.859593 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:45:55.220205 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:45:56.977903 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:45:55.220227 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:45:56.978012 systemd[1]: Finished modprobe@drm.service. May 17 00:45:55.220233 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:45:56.978218 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:45:55.220252 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:45:56.978300 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:45:55.220259 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:45:56.978501 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:45:55.220387 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:45:56.983726 jq[988]: true May 17 00:45:56.978583 systemd[1]: Finished modprobe@fuse.service. May 17 00:45:55.220410 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:45:56.978812 systemd[1]: Finished systemd-modules-load.service. May 17 00:45:55.220418 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:45:56.979049 systemd[1]: Finished systemd-network-generator.service. May 17 00:45:55.221724 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:45:56.979271 systemd[1]: Finished systemd-remount-fs.service. May 17 00:45:55.221749 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:45:56.981229 systemd[1]: Reached target network-pre.target. May 17 00:45:55.221762 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:45:56.982314 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:45:55.221770 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:45:56.984045 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:45:55.221782 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:45:56.984387 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:45:55.221790 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:45:56.985806 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:45:56.620809 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:45:56.988028 systemd[1]: Starting systemd-journal-flush.service... May 17 00:45:56.620983 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:45:56.988218 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:45:56.621045 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:45:57.003411 systemd-journald[1028]: Time spent on flushing to /var/log/journal/2ee2a720aa7a4f179bc0254cdb1f8262 is 63.953ms for 1993 entries. May 17 00:45:57.003411 systemd-journald[1028]: System Journal (/var/log/journal/2ee2a720aa7a4f179bc0254cdb1f8262) is 8.0M, max 584.8M, 576.8M free. May 17 00:45:57.094771 systemd-journald[1028]: Received client request to flush runtime journal. May 17 00:45:57.094827 kernel: loop: module loaded May 17 00:45:57.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.621150 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:45:57.095118 jq[1034]: true May 17 00:45:56.989980 systemd[1]: Starting systemd-random-seed.service... May 17 00:45:56.621195 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:45:56.991344 systemd[1]: Starting systemd-sysctl.service... May 17 00:45:56.621250 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-17T00:45:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:45:56.993962 systemd[1]: Starting systemd-sysusers.service... May 17 00:45:56.995280 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:45:57.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:56.995633 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:45:57.007039 systemd[1]: Finished systemd-random-seed.service. May 17 00:45:57.007208 systemd[1]: Reached target first-boot-complete.target. May 17 00:45:57.022243 systemd[1]: Finished systemd-sysctl.service. May 17 00:45:57.024149 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:45:57.024222 systemd[1]: Finished modprobe@loop.service. May 17 00:45:57.096704 udevadm[1053]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:45:57.024392 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:45:57.044027 systemd[1]: Finished systemd-sysusers.service. May 17 00:45:57.045000 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:45:57.073005 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:45:57.073982 systemd[1]: Starting systemd-udev-settle.service... May 17 00:45:57.091969 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:45:57.095892 systemd[1]: Finished systemd-journal-flush.service. May 17 00:45:57.115353 ignition[1035]: Ignition 2.14.0 May 17 00:45:57.115580 ignition[1035]: deleting config from guestinfo properties May 17 00:45:57.118886 ignition[1035]: Successfully deleted config May 17 00:45:57.119460 systemd[1]: Finished ignition-delete-config.service. May 17 00:45:57.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.501458 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:45:57.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.500000 audit: BPF prog-id=24 op=LOAD May 17 00:45:57.500000 audit: BPF prog-id=25 op=LOAD May 17 00:45:57.500000 audit: BPF prog-id=7 op=UNLOAD May 17 00:45:57.500000 audit: BPF prog-id=8 op=UNLOAD May 17 00:45:57.502561 systemd[1]: Starting systemd-udevd.service... May 17 00:45:57.513984 systemd-udevd[1056]: Using default interface naming scheme 'v252'. May 17 00:45:57.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.532000 audit: BPF prog-id=26 op=LOAD May 17 00:45:57.533464 systemd[1]: Started systemd-udevd.service. May 17 00:45:57.534779 systemd[1]: Starting systemd-networkd.service... May 17 00:45:57.541000 audit: BPF prog-id=27 op=LOAD May 17 00:45:57.541000 audit: BPF prog-id=28 op=LOAD May 17 00:45:57.541000 audit: BPF prog-id=29 op=LOAD May 17 00:45:57.543414 systemd[1]: Starting systemd-userdbd.service... May 17 00:45:57.566708 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:45:57.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.571576 systemd[1]: Started systemd-userdbd.service. May 17 00:45:57.602869 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:45:57.606863 kernel: ACPI: button: Power Button [PWRF] May 17 00:45:57.624059 systemd-networkd[1065]: lo: Link UP May 17 00:45:57.624065 systemd-networkd[1065]: lo: Gained carrier May 17 00:45:57.624612 systemd-networkd[1065]: Enumeration completed May 17 00:45:57.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.624677 systemd[1]: Started systemd-networkd.service. May 17 00:45:57.624686 systemd-networkd[1065]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 17 00:45:57.626926 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 17 00:45:57.627038 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 17 00:45:57.628995 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 17 00:45:57.629504 systemd-networkd[1065]: ens192: Link UP May 17 00:45:57.629616 systemd-networkd[1065]: ens192: Gained carrier May 17 00:45:57.649976 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:45:57.683000 audit[1069]: AVC avc: denied { confidentiality } for pid=1069 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:45:57.687881 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 17 00:45:57.688206 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 17 00:45:57.688317 kernel: Guest personality initialized and is active May 17 00:45:57.683000 audit[1069]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562c60504b10 a1=338ac a2=7fb2f896abc5 a3=5 items=110 ppid=1056 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:57.683000 audit: CWD cwd="/" May 17 00:45:57.683000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=1 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=2 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=3 name=(null) inode=21104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=4 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=5 name=(null) inode=21105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=6 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=7 name=(null) inode=21106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=8 name=(null) inode=21106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.692040 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 17 00:45:57.692059 kernel: Initialized host personality May 17 00:45:57.683000 audit: PATH item=9 name=(null) inode=21107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=10 name=(null) inode=21106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=11 name=(null) inode=21108 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=12 name=(null) inode=21106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=13 name=(null) inode=21109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=14 name=(null) inode=21106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=15 name=(null) inode=21110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=16 name=(null) inode=21106 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=17 name=(null) inode=21111 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=18 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=19 name=(null) inode=21112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=20 name=(null) inode=21112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=21 name=(null) inode=21113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=22 name=(null) inode=21112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=23 name=(null) inode=21114 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=24 name=(null) inode=21112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=25 name=(null) inode=21115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=26 name=(null) inode=21112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=27 name=(null) inode=21116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=28 name=(null) inode=21112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=29 name=(null) inode=21117 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=30 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=31 name=(null) inode=21118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=32 name=(null) inode=21118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=33 name=(null) inode=21119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=34 name=(null) inode=21118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=35 name=(null) inode=21120 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=36 name=(null) inode=21118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=37 name=(null) inode=21121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=38 name=(null) inode=21118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=39 name=(null) inode=21122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=40 name=(null) inode=21118 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=41 name=(null) inode=21123 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=42 name=(null) inode=21103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=43 name=(null) inode=21124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=44 name=(null) inode=21124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=45 name=(null) inode=21125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=46 name=(null) inode=21124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=47 name=(null) inode=21126 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=48 name=(null) inode=21124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=49 name=(null) inode=21127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=50 name=(null) inode=21124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=51 name=(null) inode=21128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=52 name=(null) inode=21124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=53 name=(null) inode=21129 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=55 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=56 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=57 name=(null) inode=21131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=58 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=59 name=(null) inode=21132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=60 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=61 name=(null) inode=21133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=62 name=(null) inode=21133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=63 name=(null) inode=21134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=64 name=(null) inode=21133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=65 name=(null) inode=21135 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=66 name=(null) inode=21133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=67 name=(null) inode=21136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=68 name=(null) inode=21133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.723866 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:45:57.723920 (udev-worker)[1063]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 17 00:45:57.683000 audit: PATH item=69 name=(null) inode=21137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=70 name=(null) inode=21133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.727860 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:45:57.683000 audit: PATH item=71 name=(null) inode=21138 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=72 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=73 name=(null) inode=21139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=74 name=(null) inode=21139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=75 name=(null) inode=21140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=76 name=(null) inode=21139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=77 name=(null) inode=21141 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=78 name=(null) inode=21139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=79 name=(null) inode=21142 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=80 name=(null) inode=21139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=81 name=(null) inode=21143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=82 name=(null) inode=21139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=83 name=(null) inode=21144 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=84 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=85 name=(null) inode=21145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=86 name=(null) inode=21145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=87 name=(null) inode=21146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=88 name=(null) inode=21145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=89 name=(null) inode=21147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=90 name=(null) inode=21145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=91 name=(null) inode=21148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=92 name=(null) inode=21145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=93 name=(null) inode=21149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=94 name=(null) inode=21145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=95 name=(null) inode=21150 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=96 name=(null) inode=21130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=97 name=(null) inode=21151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=98 name=(null) inode=21151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=99 name=(null) inode=21152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=100 name=(null) inode=21151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=101 name=(null) inode=21153 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=102 name=(null) inode=21151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=103 name=(null) inode=21154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=104 name=(null) inode=21151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=105 name=(null) inode=21155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=106 name=(null) inode=21151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=107 name=(null) inode=21156 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PATH item=109 name=(null) inode=21157 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:45:57.683000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:45:57.732864 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 17 00:45:57.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.739105 systemd[1]: Finished systemd-udev-settle.service. May 17 00:45:57.740022 systemd[1]: Starting lvm2-activation-early.service... May 17 00:45:57.756249 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:45:57.781463 systemd[1]: Finished lvm2-activation-early.service. May 17 00:45:57.781651 systemd[1]: Reached target cryptsetup.target. May 17 00:45:57.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.782603 systemd[1]: Starting lvm2-activation.service... May 17 00:45:57.785119 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:45:57.803294 systemd[1]: Finished lvm2-activation.service. May 17 00:45:57.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.803439 systemd[1]: Reached target local-fs-pre.target. May 17 00:45:57.803534 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:45:57.803556 systemd[1]: Reached target local-fs.target. May 17 00:45:57.803667 systemd[1]: Reached target machines.target. May 17 00:45:57.804534 systemd[1]: Starting ldconfig.service... May 17 00:45:57.805043 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:45:57.805071 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:45:57.805807 systemd[1]: Starting systemd-boot-update.service... May 17 00:45:57.806439 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:45:57.807224 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:45:57.808180 systemd[1]: Starting systemd-sysext.service... May 17 00:45:57.816014 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1092 (bootctl) May 17 00:45:57.816652 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:45:57.823763 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:45:57.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:57.832894 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:45:57.834798 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:45:57.834899 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:45:57.851890 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:45:58.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.160844 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:45:58.161319 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:45:58.179869 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:45:58.199867 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:45:58.200166 systemd-fsck[1102]: fsck.fat 4.2 (2021-01-31) May 17 00:45:58.200166 systemd-fsck[1102]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:45:58.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.201607 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:45:58.202625 systemd[1]: Mounting boot.mount... May 17 00:45:58.212801 systemd[1]: Mounted boot.mount. May 17 00:45:58.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.224829 systemd[1]: Finished systemd-boot-update.service. May 17 00:45:58.282200 (sd-sysext)[1105]: Using extensions 'kubernetes'. May 17 00:45:58.282483 (sd-sysext)[1105]: Merged extensions into '/usr'. May 17 00:45:58.303106 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:58.304224 systemd[1]: Mounting usr-share-oem.mount... May 17 00:45:58.305052 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:45:58.308159 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:45:58.309300 systemd[1]: Starting modprobe@loop.service... May 17 00:45:58.309486 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:45:58.309588 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:45:58.309699 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:58.312277 systemd[1]: Mounted usr-share-oem.mount. May 17 00:45:58.312689 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:45:58.312813 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:45:58.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.313309 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:45:58.313396 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:45:58.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.313702 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:45:58.313775 systemd[1]: Finished modprobe@loop.service. May 17 00:45:58.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.314152 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:45:58.314219 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:45:58.314792 systemd[1]: Finished systemd-sysext.service. May 17 00:45:58.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.316224 systemd[1]: Starting ensure-sysext.service... May 17 00:45:58.317018 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:45:58.321919 systemd[1]: Reloading. May 17 00:45:58.344007 systemd-tmpfiles[1113]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:45:58.348872 systemd-tmpfiles[1113]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:45:58.354067 /usr/lib/systemd/system-generators/torcx-generator[1132]: time="2025-05-17T00:45:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:45:58.354247 /usr/lib/systemd/system-generators/torcx-generator[1132]: time="2025-05-17T00:45:58Z" level=info msg="torcx already run" May 17 00:45:58.360926 systemd-tmpfiles[1113]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:45:58.423087 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:45:58.423099 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:45:58.435789 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:45:58.469000 audit: BPF prog-id=30 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=21 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=31 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=32 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=22 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=23 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=33 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=34 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=24 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=25 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=35 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=27 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=36 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=37 op=LOAD May 17 00:45:58.469000 audit: BPF prog-id=28 op=UNLOAD May 17 00:45:58.469000 audit: BPF prog-id=29 op=UNLOAD May 17 00:45:58.470000 audit: BPF prog-id=38 op=LOAD May 17 00:45:58.470000 audit: BPF prog-id=26 op=UNLOAD May 17 00:45:58.482054 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:58.482941 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:45:58.483718 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:45:58.485309 systemd[1]: Starting modprobe@loop.service... May 17 00:45:58.485447 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:45:58.485518 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:45:58.485598 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:58.486140 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:45:58.486222 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:45:58.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.486588 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:45:58.486660 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:45:58.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.487012 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:45:58.487077 systemd[1]: Finished modprobe@loop.service. May 17 00:45:58.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.490453 systemd[1]: Finished ensure-sysext.service. May 17 00:45:58.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.491173 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:58.491773 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:45:58.492444 systemd[1]: Starting modprobe@drm.service... May 17 00:45:58.493511 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:45:58.494514 systemd[1]: Starting modprobe@loop.service... May 17 00:45:58.494696 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:45:58.494736 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:45:58.495803 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:45:58.496166 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:45:58.496584 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:45:58.496671 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:45:58.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.496917 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:45:58.496982 systemd[1]: Finished modprobe@drm.service. May 17 00:45:58.497206 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:45:58.497267 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:45:58.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.497472 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:45:58.497541 systemd[1]: Finished modprobe@loop.service. May 17 00:45:58.500162 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:45:58.500248 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:45:58.502453 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:45:58.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.504044 systemd[1]: Starting audit-rules.service... May 17 00:45:58.505209 systemd[1]: Starting clean-ca-certificates.service... May 17 00:45:58.506587 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:45:58.505000 audit: BPF prog-id=39 op=LOAD May 17 00:45:58.510914 systemd[1]: Starting systemd-resolved.service... May 17 00:45:58.509000 audit: BPF prog-id=40 op=LOAD May 17 00:45:58.512735 systemd[1]: Starting systemd-timesyncd.service... May 17 00:45:58.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.514971 systemd[1]: Starting systemd-update-utmp.service... May 17 00:45:58.515377 systemd[1]: Finished clean-ca-certificates.service. May 17 00:45:58.515679 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:45:58.517000 audit[1209]: SYSTEM_BOOT pid=1209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:45:58.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.521580 systemd[1]: Finished systemd-update-utmp.service. May 17 00:45:58.538816 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:45:58.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:58.560151 systemd[1]: Started systemd-timesyncd.service. May 17 00:45:58.560323 systemd[1]: Reached target time-set.target. May 17 00:45:58.559000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:45:58.559000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff01e88410 a2=420 a3=0 items=0 ppid=1201 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:58.559000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:45:58.561067 augenrules[1221]: No rules May 17 00:45:58.561381 systemd[1]: Finished audit-rules.service. May 17 00:45:58.572550 systemd-resolved[1205]: Positive Trust Anchors: May 17 00:45:58.572562 systemd-resolved[1205]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:45:58.572811 systemd-resolved[1205]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:45:58.601838 systemd-resolved[1205]: Defaulting to hostname 'linux'. May 17 00:45:58.603690 systemd[1]: Started systemd-resolved.service. May 17 00:45:58.603840 systemd[1]: Reached target network.target. May 17 00:45:58.603935 systemd[1]: Reached target nss-lookup.target. May 17 00:47:19.913042 systemd-resolved[1205]: Clock change detected. Flushing caches. May 17 00:47:19.913149 systemd-timesyncd[1207]: Contacted time server 23.150.41.122:123 (0.flatcar.pool.ntp.org). May 17 00:47:19.913228 systemd-timesyncd[1207]: Initial clock synchronization to Sat 2025-05-17 00:47:19.913011 UTC. May 17 00:47:19.965737 ldconfig[1091]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:47:19.968401 systemd[1]: Finished ldconfig.service. May 17 00:47:19.969637 systemd[1]: Starting systemd-update-done.service... May 17 00:47:19.974752 systemd[1]: Finished systemd-update-done.service. May 17 00:47:19.974934 systemd[1]: Reached target sysinit.target. May 17 00:47:19.975087 systemd[1]: Started motdgen.path. May 17 00:47:19.975223 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:47:19.975426 systemd[1]: Started logrotate.timer. May 17 00:47:19.975550 systemd[1]: Started mdadm.timer. May 17 00:47:19.975636 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:47:19.975733 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:47:19.975752 systemd[1]: Reached target paths.target. May 17 00:47:19.975834 systemd[1]: Reached target timers.target. May 17 00:47:19.976082 systemd[1]: Listening on dbus.socket. May 17 00:47:19.976899 systemd[1]: Starting docker.socket... May 17 00:47:19.979001 systemd[1]: Listening on sshd.socket. May 17 00:47:19.979192 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:19.979661 systemd[1]: Listening on docker.socket. May 17 00:47:19.979805 systemd[1]: Reached target sockets.target. May 17 00:47:19.979898 systemd[1]: Reached target basic.target. May 17 00:47:19.980022 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:47:19.980042 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:47:19.981134 systemd[1]: Starting containerd.service... May 17 00:47:19.982487 systemd[1]: Starting dbus.service... May 17 00:47:19.984693 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:47:19.986590 systemd[1]: Starting extend-filesystems.service... May 17 00:47:19.988040 jq[1232]: false May 17 00:47:19.987158 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:47:19.988111 systemd[1]: Starting motdgen.service... May 17 00:47:19.990023 systemd[1]: Starting prepare-helm.service... May 17 00:47:19.991352 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:47:19.992710 systemd[1]: Starting sshd-keygen.service... May 17 00:47:19.995450 systemd[1]: Starting systemd-logind.service... May 17 00:47:19.995565 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:47:19.995601 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:47:19.996001 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:47:19.996390 systemd[1]: Starting update-engine.service... May 17 00:47:19.998365 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:47:20.000842 systemd[1]: Starting vmtoolsd.service... May 17 00:47:20.005410 jq[1243]: true May 17 00:47:20.002021 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:47:20.002161 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:47:20.002992 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:47:20.003098 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:47:20.018979 systemd[1]: Started vmtoolsd.service. May 17 00:47:20.019525 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:47:20.019636 systemd[1]: Finished motdgen.service. May 17 00:47:20.021679 jq[1250]: true May 17 00:47:20.034827 env[1249]: time="2025-05-17T00:47:20.034798529Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:47:20.038657 tar[1247]: linux-amd64/LICENSE May 17 00:47:20.038657 tar[1247]: linux-amd64/helm May 17 00:47:20.057573 extend-filesystems[1233]: Found loop1 May 17 00:47:20.057573 extend-filesystems[1233]: Found sda May 17 00:47:20.057573 extend-filesystems[1233]: Found sda1 May 17 00:47:20.057573 extend-filesystems[1233]: Found sda2 May 17 00:47:20.057573 extend-filesystems[1233]: Found sda3 May 17 00:47:20.059122 extend-filesystems[1233]: Found usr May 17 00:47:20.059122 extend-filesystems[1233]: Found sda4 May 17 00:47:20.059122 extend-filesystems[1233]: Found sda6 May 17 00:47:20.059122 extend-filesystems[1233]: Found sda7 May 17 00:47:20.059122 extend-filesystems[1233]: Found sda9 May 17 00:47:20.059122 extend-filesystems[1233]: Checking size of /dev/sda9 May 17 00:47:20.074804 bash[1279]: Updated "/home/core/.ssh/authorized_keys" May 17 00:47:20.074954 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:47:20.075981 extend-filesystems[1233]: Old size kept for /dev/sda9 May 17 00:47:20.076114 extend-filesystems[1233]: Found sr0 May 17 00:47:20.076248 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:47:20.076349 systemd[1]: Finished extend-filesystems.service. May 17 00:47:20.079764 systemd-logind[1240]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:47:20.079778 systemd-logind[1240]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:47:20.080717 systemd-logind[1240]: New seat seat0. May 17 00:47:20.083302 dbus-daemon[1231]: [system] SELinux support is enabled May 17 00:47:20.083450 systemd[1]: Started dbus.service. May 17 00:47:20.085049 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:47:20.085070 systemd[1]: Reached target system-config.target. May 17 00:47:20.085186 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:47:20.085196 systemd[1]: Reached target user-config.target. May 17 00:47:20.089665 systemd[1]: Started systemd-logind.service. May 17 00:47:20.105751 kernel: NET: Registered PF_VSOCK protocol family May 17 00:47:20.114413 env[1249]: time="2025-05-17T00:47:20.114387420Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:47:20.114612 env[1249]: time="2025-05-17T00:47:20.114602181Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:20.119557 env[1249]: time="2025-05-17T00:47:20.119532148Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:47:20.119557 env[1249]: time="2025-05-17T00:47:20.119553786Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:20.119692 env[1249]: time="2025-05-17T00:47:20.119677219Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:47:20.119692 env[1249]: time="2025-05-17T00:47:20.119690705Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:47:20.119747 env[1249]: time="2025-05-17T00:47:20.119700610Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:47:20.119747 env[1249]: time="2025-05-17T00:47:20.119707804Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:47:20.119780 env[1249]: time="2025-05-17T00:47:20.119754099Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:20.119895 env[1249]: time="2025-05-17T00:47:20.119882846Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:47:20.119966 env[1249]: time="2025-05-17T00:47:20.119952601Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:47:20.119966 env[1249]: time="2025-05-17T00:47:20.119964764Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:47:20.120020 env[1249]: time="2025-05-17T00:47:20.119993129Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:47:20.120020 env[1249]: time="2025-05-17T00:47:20.120000525Z" level=info msg="metadata content store policy set" policy=shared May 17 00:47:20.125453 update_engine[1242]: I0517 00:47:20.123497 1242 main.cc:92] Flatcar Update Engine starting May 17 00:47:20.127156 systemd[1]: Started update-engine.service. May 17 00:47:20.128046 update_engine[1242]: I0517 00:47:20.128031 1242 update_check_scheduler.cc:74] Next update check in 7m49s May 17 00:47:20.130094 env[1249]: time="2025-05-17T00:47:20.130074519Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:47:20.130147 env[1249]: time="2025-05-17T00:47:20.130098816Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:47:20.130147 env[1249]: time="2025-05-17T00:47:20.130107647Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:47:20.130147 env[1249]: time="2025-05-17T00:47:20.130128464Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130147 env[1249]: time="2025-05-17T00:47:20.130137869Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130147 env[1249]: time="2025-05-17T00:47:20.130145463Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130231 env[1249]: time="2025-05-17T00:47:20.130153641Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130231 env[1249]: time="2025-05-17T00:47:20.130161480Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130231 env[1249]: time="2025-05-17T00:47:20.130168919Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130231 env[1249]: time="2025-05-17T00:47:20.130176080Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130231 env[1249]: time="2025-05-17T00:47:20.130183263Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:47:20.130231 env[1249]: time="2025-05-17T00:47:20.130190782Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:47:20.130322 env[1249]: time="2025-05-17T00:47:20.130255727Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:47:20.130322 env[1249]: time="2025-05-17T00:47:20.130302752Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:47:20.132089 env[1249]: time="2025-05-17T00:47:20.132073420Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:47:20.132134 env[1249]: time="2025-05-17T00:47:20.132094785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132134 env[1249]: time="2025-05-17T00:47:20.132106234Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:47:20.132168 env[1249]: time="2025-05-17T00:47:20.132134447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132168 env[1249]: time="2025-05-17T00:47:20.132142294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132168 env[1249]: time="2025-05-17T00:47:20.132149755Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132168 env[1249]: time="2025-05-17T00:47:20.132156275Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132168 env[1249]: time="2025-05-17T00:47:20.132162780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132243 env[1249]: time="2025-05-17T00:47:20.132170453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132243 env[1249]: time="2025-05-17T00:47:20.132178129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132243 env[1249]: time="2025-05-17T00:47:20.132185077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132243 env[1249]: time="2025-05-17T00:47:20.132192822Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:47:20.132826 env[1249]: time="2025-05-17T00:47:20.132809947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132858 env[1249]: time="2025-05-17T00:47:20.132825211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132858 env[1249]: time="2025-05-17T00:47:20.132834065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:47:20.132858 env[1249]: time="2025-05-17T00:47:20.132841280Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:47:20.132858 env[1249]: time="2025-05-17T00:47:20.132850365Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:47:20.132858 env[1249]: time="2025-05-17T00:47:20.132856700Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:47:20.132964 env[1249]: time="2025-05-17T00:47:20.132867818Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:47:20.134193 systemd[1]: Started locksmithd.service. May 17 00:47:20.135874 env[1249]: time="2025-05-17T00:47:20.135776532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:47:20.135952 env[1249]: time="2025-05-17T00:47:20.135918881Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:47:20.138301 env[1249]: time="2025-05-17T00:47:20.135957662Z" level=info msg="Connect containerd service" May 17 00:47:20.138301 env[1249]: time="2025-05-17T00:47:20.135981278Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:47:20.139242 env[1249]: time="2025-05-17T00:47:20.138735269Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:47:20.139242 env[1249]: time="2025-05-17T00:47:20.138876710Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:47:20.139242 env[1249]: time="2025-05-17T00:47:20.138899204Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:47:20.139242 env[1249]: time="2025-05-17T00:47:20.139179165Z" level=info msg="containerd successfully booted in 0.104945s" May 17 00:47:20.138954 systemd[1]: Started containerd.service. May 17 00:47:20.139565 env[1249]: time="2025-05-17T00:47:20.139401370Z" level=info msg="Start subscribing containerd event" May 17 00:47:20.139565 env[1249]: time="2025-05-17T00:47:20.139430940Z" level=info msg="Start recovering state" May 17 00:47:20.139565 env[1249]: time="2025-05-17T00:47:20.139547843Z" level=info msg="Start event monitor" May 17 00:47:20.139622 env[1249]: time="2025-05-17T00:47:20.139578337Z" level=info msg="Start snapshots syncer" May 17 00:47:20.139622 env[1249]: time="2025-05-17T00:47:20.139588002Z" level=info msg="Start cni network conf syncer for default" May 17 00:47:20.139622 env[1249]: time="2025-05-17T00:47:20.139592791Z" level=info msg="Start streaming server" May 17 00:47:20.382064 sshd_keygen[1255]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:47:20.395644 systemd[1]: Finished sshd-keygen.service. May 17 00:47:20.396840 systemd[1]: Starting issuegen.service... May 17 00:47:20.401236 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:47:20.401332 systemd[1]: Finished issuegen.service. May 17 00:47:20.402414 systemd[1]: Starting systemd-user-sessions.service... May 17 00:47:20.407578 systemd[1]: Finished systemd-user-sessions.service. May 17 00:47:20.408621 systemd[1]: Started getty@tty1.service. May 17 00:47:20.409483 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:47:20.409686 systemd[1]: Reached target getty.target. May 17 00:47:20.425311 locksmithd[1293]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:47:20.461549 systemd-networkd[1065]: ens192: Gained IPv6LL May 17 00:47:20.462578 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:47:20.462922 systemd[1]: Reached target network-online.target. May 17 00:47:20.464788 systemd[1]: Starting kubelet.service... May 17 00:47:20.476716 tar[1247]: linux-amd64/README.md May 17 00:47:20.479760 systemd[1]: Finished prepare-helm.service. May 17 00:47:21.712988 systemd[1]: Started kubelet.service. May 17 00:47:21.713430 systemd[1]: Reached target multi-user.target. May 17 00:47:21.714492 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:47:21.719067 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:47:21.719163 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:47:21.719346 systemd[1]: Startup finished in 881ms (kernel) + 5.475s (initrd) + 5.396s (userspace) = 11.752s. May 17 00:47:21.826981 login[1355]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:47:21.828073 login[1356]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:47:21.849014 systemd[1]: Created slice user-500.slice. May 17 00:47:21.849856 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:47:21.854241 systemd-logind[1240]: New session 1 of user core. May 17 00:47:21.856753 systemd-logind[1240]: New session 2 of user core. May 17 00:47:21.859057 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:47:21.860115 systemd[1]: Starting user@500.service... May 17 00:47:21.862616 (systemd)[1366]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:21.912020 systemd[1366]: Queued start job for default target default.target. May 17 00:47:21.912369 systemd[1366]: Reached target paths.target. May 17 00:47:21.912383 systemd[1366]: Reached target sockets.target. May 17 00:47:21.912392 systemd[1366]: Reached target timers.target. May 17 00:47:21.912399 systemd[1366]: Reached target basic.target. May 17 00:47:21.912461 systemd[1]: Started user@500.service. May 17 00:47:21.913158 systemd[1]: Started session-1.scope. May 17 00:47:21.913657 systemd[1]: Started session-2.scope. May 17 00:47:21.914047 systemd[1366]: Reached target default.target. May 17 00:47:21.914140 systemd[1366]: Startup finished in 46ms. May 17 00:47:22.354409 kubelet[1363]: E0517 00:47:22.354383 1363 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:22.355564 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:22.355642 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:32.606324 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:47:32.606499 systemd[1]: Stopped kubelet.service. May 17 00:47:32.607673 systemd[1]: Starting kubelet.service... May 17 00:47:32.666969 systemd[1]: Started kubelet.service. May 17 00:47:32.723105 kubelet[1394]: E0517 00:47:32.723081 1394 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:32.725201 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:32.725274 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:42.975781 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:47:42.975899 systemd[1]: Stopped kubelet.service. May 17 00:47:42.976916 systemd[1]: Starting kubelet.service... May 17 00:47:43.202466 systemd[1]: Started kubelet.service. May 17 00:47:43.263262 kubelet[1403]: E0517 00:47:43.263155 1403 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:43.264613 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:43.264705 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:50.167818 systemd[1]: Created slice system-sshd.slice. May 17 00:47:50.168626 systemd[1]: Started sshd@0-139.178.70.107:22-147.75.109.163:53994.service. May 17 00:47:50.213094 sshd[1410]: Accepted publickey for core from 147.75.109.163 port 53994 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.213889 sshd[1410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.216862 systemd[1]: Started session-3.scope. May 17 00:47:50.217084 systemd-logind[1240]: New session 3 of user core. May 17 00:47:50.264189 systemd[1]: Started sshd@1-139.178.70.107:22-147.75.109.163:54000.service. May 17 00:47:50.302610 sshd[1415]: Accepted publickey for core from 147.75.109.163 port 54000 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.303467 sshd[1415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.306553 systemd[1]: Started session-4.scope. May 17 00:47:50.306769 systemd-logind[1240]: New session 4 of user core. May 17 00:47:50.358195 systemd[1]: Started sshd@2-139.178.70.107:22-147.75.109.163:54002.service. May 17 00:47:50.358562 sshd[1415]: pam_unix(sshd:session): session closed for user core May 17 00:47:50.360394 systemd[1]: sshd@1-139.178.70.107:22-147.75.109.163:54000.service: Deactivated successfully. May 17 00:47:50.360741 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:47:50.360948 systemd-logind[1240]: Session 4 logged out. Waiting for processes to exit. May 17 00:47:50.361347 systemd-logind[1240]: Removed session 4. May 17 00:47:50.394799 sshd[1420]: Accepted publickey for core from 147.75.109.163 port 54002 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.395663 sshd[1420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.398426 systemd[1]: Started session-5.scope. May 17 00:47:50.398621 systemd-logind[1240]: New session 5 of user core. May 17 00:47:50.444719 sshd[1420]: pam_unix(sshd:session): session closed for user core May 17 00:47:50.446940 systemd[1]: sshd@2-139.178.70.107:22-147.75.109.163:54002.service: Deactivated successfully. May 17 00:47:50.447269 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:47:50.447667 systemd-logind[1240]: Session 5 logged out. Waiting for processes to exit. May 17 00:47:50.448294 systemd[1]: Started sshd@3-139.178.70.107:22-147.75.109.163:54016.service. May 17 00:47:50.448872 systemd-logind[1240]: Removed session 5. May 17 00:47:50.483810 sshd[1427]: Accepted publickey for core from 147.75.109.163 port 54016 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.484616 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.487074 systemd-logind[1240]: New session 6 of user core. May 17 00:47:50.487538 systemd[1]: Started session-6.scope. May 17 00:47:50.536773 sshd[1427]: pam_unix(sshd:session): session closed for user core May 17 00:47:50.538807 systemd[1]: sshd@3-139.178.70.107:22-147.75.109.163:54016.service: Deactivated successfully. May 17 00:47:50.539186 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:47:50.539572 systemd-logind[1240]: Session 6 logged out. Waiting for processes to exit. May 17 00:47:50.540243 systemd[1]: Started sshd@4-139.178.70.107:22-147.75.109.163:54022.service. May 17 00:47:50.540907 systemd-logind[1240]: Removed session 6. May 17 00:47:50.576562 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 54022 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.577499 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.580393 systemd-logind[1240]: New session 7 of user core. May 17 00:47:50.581270 systemd[1]: Started session-7.scope. May 17 00:47:50.639651 sudo[1436]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:47:50.639789 sudo[1436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:50.646330 dbus-daemon[1231]: Э-\xb6\xc7U: received setenforce notice (enforcing=460340928) May 17 00:47:50.646429 sudo[1436]: pam_unix(sudo:session): session closed for user root May 17 00:47:50.648334 sshd[1433]: pam_unix(sshd:session): session closed for user core May 17 00:47:50.650152 systemd[1]: Started sshd@5-139.178.70.107:22-147.75.109.163:54028.service. May 17 00:47:50.650681 systemd[1]: sshd@4-139.178.70.107:22-147.75.109.163:54022.service: Deactivated successfully. May 17 00:47:50.651095 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:47:50.651614 systemd-logind[1240]: Session 7 logged out. Waiting for processes to exit. May 17 00:47:50.652466 systemd-logind[1240]: Removed session 7. May 17 00:47:50.687152 sshd[1439]: Accepted publickey for core from 147.75.109.163 port 54028 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.687964 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.690505 systemd-logind[1240]: New session 8 of user core. May 17 00:47:50.690975 systemd[1]: Started session-8.scope. May 17 00:47:50.739728 sudo[1444]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:47:50.740477 sudo[1444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:50.742208 sudo[1444]: pam_unix(sudo:session): session closed for user root May 17 00:47:50.744989 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:47:50.745120 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:50.750602 systemd[1]: Stopping audit-rules.service... May 17 00:47:50.751000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:47:50.752502 kernel: kauditd_printk_skb: 293 callbacks suppressed May 17 00:47:50.752532 kernel: audit: type=1305 audit(1747442870.751:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:47:50.751000 audit[1447]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff932fd9f0 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.754459 auditctl[1447]: No rules May 17 00:47:50.757783 kernel: audit: type=1300 audit(1747442870.751:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff932fd9f0 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.754714 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:47:50.754816 systemd[1]: Stopped audit-rules.service. May 17 00:47:50.757680 systemd[1]: Starting audit-rules.service... May 17 00:47:50.751000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:47:50.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.762188 kernel: audit: type=1327 audit(1747442870.751:213): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:47:50.762210 kernel: audit: type=1131 audit(1747442870.754:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.770814 augenrules[1464]: No rules May 17 00:47:50.771245 systemd[1]: Finished audit-rules.service. May 17 00:47:50.771922 sudo[1443]: pam_unix(sudo:session): session closed for user root May 17 00:47:50.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.774870 sshd[1439]: pam_unix(sshd:session): session closed for user core May 17 00:47:50.775396 kernel: audit: type=1130 audit(1747442870.771:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.771000 audit[1443]: USER_END pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.779614 kernel: audit: type=1106 audit(1747442870.771:216): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.780085 systemd[1]: Started sshd@6-139.178.70.107:22-147.75.109.163:54034.service. May 17 00:47:50.780434 systemd[1]: sshd@5-139.178.70.107:22-147.75.109.163:54028.service: Deactivated successfully. May 17 00:47:50.780797 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:47:50.771000 audit[1443]: CRED_DISP pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.783925 systemd-logind[1240]: Session 8 logged out. Waiting for processes to exit. May 17 00:47:50.787848 kernel: audit: type=1104 audit(1747442870.771:217): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.787883 kernel: audit: type=1106 audit(1747442870.779:218): pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.779000 audit[1439]: USER_END pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.790949 kernel: audit: type=1104 audit(1747442870.779:219): pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.779000 audit[1439]: CRED_DISP pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.791084 systemd-logind[1240]: Removed session 8. May 17 00:47:50.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.794134 kernel: audit: type=1130 audit(1747442870.779:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-147.75.109.163:54028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:50.816000 audit[1469]: USER_ACCT pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.817032 sshd[1469]: Accepted publickey for core from 147.75.109.163 port 54034 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:47:50.817000 audit[1469]: CRED_ACQ pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.817000 audit[1469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc72b51750 a2=3 a3=0 items=0 ppid=1 pid=1469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.817000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:47:50.818166 sshd[1469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:47:50.820568 systemd-logind[1240]: New session 9 of user core. May 17 00:47:50.821008 systemd[1]: Started session-9.scope. May 17 00:47:50.823000 audit[1469]: USER_START pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.824000 audit[1472]: CRED_ACQ pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:47:50.870217 sudo[1473]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:47:50.870383 sudo[1473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:47:50.869000 audit[1473]: USER_ACCT pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.869000 audit[1473]: CRED_REFR pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.871000 audit[1473]: USER_START pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:47:50.884334 systemd[1]: Starting docker.service... May 17 00:47:50.909323 env[1484]: time="2025-05-17T00:47:50.909291918Z" level=info msg="Starting up" May 17 00:47:50.910045 env[1484]: time="2025-05-17T00:47:50.910031410Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:47:50.910045 env[1484]: time="2025-05-17T00:47:50.910043358Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:47:50.910090 env[1484]: time="2025-05-17T00:47:50.910055941Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:47:50.910090 env[1484]: time="2025-05-17T00:47:50.910061938Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:47:50.910869 env[1484]: time="2025-05-17T00:47:50.910858565Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:47:50.910922 env[1484]: time="2025-05-17T00:47:50.910913096Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:47:50.910970 env[1484]: time="2025-05-17T00:47:50.910959876Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:47:50.911012 env[1484]: time="2025-05-17T00:47:50.911003734Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:47:50.940693 env[1484]: time="2025-05-17T00:47:50.940671870Z" level=info msg="Loading containers: start." May 17 00:47:50.987000 audit[1514]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:50.987000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe81f92cb0 a2=0 a3=7ffe81f92c9c items=0 ppid=1484 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:47:50.988000 audit[1516]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:50.988000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff3d31a2a0 a2=0 a3=7fff3d31a28c items=0 ppid=1484 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:47:50.989000 audit[1518]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:50.989000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc5575c3c0 a2=0 a3=7ffc5575c3ac items=0 ppid=1484 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:47:50.992000 audit[1520]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:50.992000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2b0e2900 a2=0 a3=7ffd2b0e28ec items=0 ppid=1484 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:47:50.993000 audit[1522]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:50.993000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc98748810 a2=0 a3=7ffc987487fc items=0 ppid=1484 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:50.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:47:51.007000 audit[1527]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.007000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2e1b4e40 a2=0 a3=7fff2e1b4e2c items=0 ppid=1484 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:47:51.010000 audit[1529]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.010000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd5c76510 a2=0 a3=7fffd5c764fc items=0 ppid=1484 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:47:51.011000 audit[1531]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.011000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdf1d8c680 a2=0 a3=7ffdf1d8c66c items=0 ppid=1484 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:47:51.012000 audit[1533]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.012000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff4ccda240 a2=0 a3=7fff4ccda22c items=0 ppid=1484 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:51.015000 audit[1537]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.015000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc07091c80 a2=0 a3=7ffc07091c6c items=0 ppid=1484 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:51.022000 audit[1538]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.022000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff8f6af8b0 a2=0 a3=7fff8f6af89c items=0 ppid=1484 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:51.029371 kernel: Initializing XFRM netlink socket May 17 00:47:51.052834 env[1484]: time="2025-05-17T00:47:51.052816544Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:47:51.067000 audit[1546]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.067000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcd733b090 a2=0 a3=7ffcd733b07c items=0 ppid=1484 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.067000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:47:51.076000 audit[1549]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.076000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdaa3623d0 a2=0 a3=7ffdaa3623bc items=0 ppid=1484 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.076000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:47:51.078000 audit[1552]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.078000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcc1d98c20 a2=0 a3=7ffcc1d98c0c items=0 ppid=1484 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:47:51.079000 audit[1554]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.079000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe4f026360 a2=0 a3=7ffe4f02634c items=0 ppid=1484 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:47:51.080000 audit[1556]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.080000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc48ffdb80 a2=0 a3=7ffc48ffdb6c items=0 ppid=1484 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:47:51.081000 audit[1558]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.081000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc6f528430 a2=0 a3=7ffc6f52841c items=0 ppid=1484 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.081000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:47:51.083000 audit[1560]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.083000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca9466840 a2=0 a3=7ffca946682c items=0 ppid=1484 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:47:51.089000 audit[1563]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.089000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffebba5830 a2=0 a3=7fffebba581c items=0 ppid=1484 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:47:51.090000 audit[1565]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.090000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff8818a220 a2=0 a3=7fff8818a20c items=0 ppid=1484 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:47:51.091000 audit[1567]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.091000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd49aafe50 a2=0 a3=7ffd49aafe3c items=0 ppid=1484 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:47:51.092000 audit[1569]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.092000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdcbfc1df0 a2=0 a3=7ffdcbfc1ddc items=0 ppid=1484 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:47:51.093491 systemd-networkd[1065]: docker0: Link UP May 17 00:47:51.096000 audit[1573]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.096000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6590d050 a2=0 a3=7ffc6590d03c items=0 ppid=1484 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:51.101000 audit[1574]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:47:51.101000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff5b498640 a2=0 a3=7fff5b49862c items=0 ppid=1484 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:47:51.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:47:51.102186 env[1484]: time="2025-05-17T00:47:51.102166092Z" level=info msg="Loading containers: done." May 17 00:47:51.107750 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1674270398-merged.mount: Deactivated successfully. May 17 00:47:51.112421 env[1484]: time="2025-05-17T00:47:51.112400250Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:47:51.112511 env[1484]: time="2025-05-17T00:47:51.112497341Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:47:51.112559 env[1484]: time="2025-05-17T00:47:51.112547738Z" level=info msg="Daemon has completed initialization" May 17 00:47:51.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:51.118128 systemd[1]: Started docker.service. May 17 00:47:51.127654 env[1484]: time="2025-05-17T00:47:51.127627181Z" level=info msg="API listen on /run/docker.sock" May 17 00:47:52.225443 env[1249]: time="2025-05-17T00:47:52.225406154Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\"" May 17 00:47:52.812312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount869175922.mount: Deactivated successfully. May 17 00:47:53.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:53.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:53.367475 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:47:53.367596 systemd[1]: Stopped kubelet.service. May 17 00:47:53.368560 systemd[1]: Starting kubelet.service... May 17 00:47:53.425257 systemd[1]: Started kubelet.service. May 17 00:47:53.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:47:53.484437 kubelet[1611]: E0517 00:47:53.484410 1611 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:47:53.485254 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:47:53.485326 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:47:53.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:47:53.898172 env[1249]: time="2025-05-17T00:47:53.898141458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:53.898804 env[1249]: time="2025-05-17T00:47:53.898788411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:53.899772 env[1249]: time="2025-05-17T00:47:53.899757722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:53.900843 env[1249]: time="2025-05-17T00:47:53.900829332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0bee1bf751fe06009678c0cde7545443ba3a8d2edf71cea4c69cbb5774b9bf47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:53.901270 env[1249]: time="2025-05-17T00:47:53.901253279Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\" returns image reference \"sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4\"" May 17 00:47:53.901699 env[1249]: time="2025-05-17T00:47:53.901684995Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\"" May 17 00:47:55.378467 env[1249]: time="2025-05-17T00:47:55.378407383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:55.379278 env[1249]: time="2025-05-17T00:47:55.379258195Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:55.380733 env[1249]: time="2025-05-17T00:47:55.380714917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:55.381993 env[1249]: time="2025-05-17T00:47:55.381975196Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:79bcf2f5e614c336c02dcea9dfcdf485d7297aed6a21239a99c87f7164f9baca,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:55.382692 env[1249]: time="2025-05-17T00:47:55.382642250Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\" returns image reference \"sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00\"" May 17 00:47:55.383030 env[1249]: time="2025-05-17T00:47:55.383013252Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\"" May 17 00:47:56.478467 env[1249]: time="2025-05-17T00:47:56.478438668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.479904 env[1249]: time="2025-05-17T00:47:56.479887788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.481395 env[1249]: time="2025-05-17T00:47:56.481380106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.482822 env[1249]: time="2025-05-17T00:47:56.482809373Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:f0f39d8b9808c407cacb3a46a5a9ce4d4a4a7cf3b674ba4bd221f5bc90051d2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:56.483263 env[1249]: time="2025-05-17T00:47:56.483249411Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\" returns image reference \"sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a\"" May 17 00:47:56.484092 env[1249]: time="2025-05-17T00:47:56.484075182Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:47:57.799151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount500171529.mount: Deactivated successfully. May 17 00:47:58.358397 env[1249]: time="2025-05-17T00:47:58.358364166Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.370404 env[1249]: time="2025-05-17T00:47:58.370386094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.376723 env[1249]: time="2025-05-17T00:47:58.376697924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.379703 env[1249]: time="2025-05-17T00:47:58.379686597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:58.380005 env[1249]: time="2025-05-17T00:47:58.379986612Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:47:58.380449 env[1249]: time="2025-05-17T00:47:58.380433619Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:47:58.943738 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3779254823.mount: Deactivated successfully. May 17 00:47:59.893151 env[1249]: time="2025-05-17T00:47:59.893120335Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:59.905153 env[1249]: time="2025-05-17T00:47:59.905136527Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:59.913970 env[1249]: time="2025-05-17T00:47:59.913956528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:59.919108 env[1249]: time="2025-05-17T00:47:59.919096261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:47:59.919604 env[1249]: time="2025-05-17T00:47:59.919589234Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:47:59.920350 env[1249]: time="2025-05-17T00:47:59.920337603Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:48:00.414682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2574887425.mount: Deactivated successfully. May 17 00:48:00.428502 env[1249]: time="2025-05-17T00:48:00.428479145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.441043 env[1249]: time="2025-05-17T00:48:00.441026631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.448050 env[1249]: time="2025-05-17T00:48:00.448034864Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.456893 env[1249]: time="2025-05-17T00:48:00.456876581Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:00.457758 env[1249]: time="2025-05-17T00:48:00.457349403Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:48:00.458217 env[1249]: time="2025-05-17T00:48:00.458201438Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 17 00:48:01.324830 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3292012810.mount: Deactivated successfully. May 17 00:48:03.582012 env[1249]: time="2025-05-17T00:48:03.581960664Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:03.597992 env[1249]: time="2025-05-17T00:48:03.597972730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:03.600045 env[1249]: time="2025-05-17T00:48:03.600024230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:03.602859 env[1249]: time="2025-05-17T00:48:03.602834415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:03.603603 env[1249]: time="2025-05-17T00:48:03.603577842Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 17 00:48:03.617550 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:48:03.617696 systemd[1]: Stopped kubelet.service. May 17 00:48:03.620152 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:48:03.620223 kernel: audit: type=1130 audit(1747442883.616:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.618935 systemd[1]: Starting kubelet.service... May 17 00:48:03.623707 kernel: audit: type=1131 audit(1747442883.616:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:03.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:04.980604 update_engine[1242]: I0517 00:48:04.980387 1242 update_attempter.cc:509] Updating boot flags... May 17 00:48:05.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:05.300306 systemd[1]: Started kubelet.service. May 17 00:48:05.303411 kernel: audit: type=1130 audit(1747442885.299:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:05.330221 kubelet[1657]: E0517 00:48:05.330199 1657 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:48:05.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:05.331256 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:48:05.331328 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:48:05.334369 kernel: audit: type=1131 audit(1747442885.330:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:06.503705 systemd[1]: Stopped kubelet.service. May 17 00:48:06.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:06.505115 systemd[1]: Starting kubelet.service... May 17 00:48:06.507369 kernel: audit: type=1130 audit(1747442886.502:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:06.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:06.510705 kernel: audit: type=1131 audit(1747442886.502:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:06.530770 systemd[1]: Reloading. May 17 00:48:06.577021 /usr/lib/systemd/system-generators/torcx-generator[1689]: time="2025-05-17T00:48:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:48:06.577251 /usr/lib/systemd/system-generators/torcx-generator[1689]: time="2025-05-17T00:48:06Z" level=info msg="torcx already run" May 17 00:48:06.641058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:48:06.641073 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:48:06.657222 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:48:06.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710034 kernel: audit: type=1400 audit(1747442886.698:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710089 kernel: audit: type=1400 audit(1747442886.698:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710110 kernel: audit: type=1400 audit(1747442886.701:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710125 kernel: audit: type=1400 audit(1747442886.701:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit: BPF prog-id=46 op=LOAD May 17 00:48:06.708000 audit: BPF prog-id=41 op=UNLOAD May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit: BPF prog-id=47 op=LOAD May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.708000 audit: BPF prog-id=48 op=LOAD May 17 00:48:06.708000 audit: BPF prog-id=42 op=UNLOAD May 17 00:48:06.708000 audit: BPF prog-id=43 op=UNLOAD May 17 00:48:06.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.709000 audit: BPF prog-id=49 op=LOAD May 17 00:48:06.709000 audit: BPF prog-id=40 op=UNLOAD May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit: BPF prog-id=50 op=LOAD May 17 00:48:06.710000 audit: BPF prog-id=30 op=UNLOAD May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit: BPF prog-id=51 op=LOAD May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit: BPF prog-id=52 op=LOAD May 17 00:48:06.710000 audit: BPF prog-id=31 op=UNLOAD May 17 00:48:06.710000 audit: BPF prog-id=32 op=UNLOAD May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.710000 audit: BPF prog-id=53 op=LOAD May 17 00:48:06.710000 audit: BPF prog-id=44 op=UNLOAD May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit: BPF prog-id=54 op=LOAD May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit: BPF prog-id=55 op=LOAD May 17 00:48:06.711000 audit: BPF prog-id=33 op=UNLOAD May 17 00:48:06.711000 audit: BPF prog-id=34 op=UNLOAD May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit: BPF prog-id=56 op=LOAD May 17 00:48:06.711000 audit: BPF prog-id=35 op=UNLOAD May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit: BPF prog-id=57 op=LOAD May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit: BPF prog-id=58 op=LOAD May 17 00:48:06.712000 audit: BPF prog-id=36 op=UNLOAD May 17 00:48:06.712000 audit: BPF prog-id=37 op=UNLOAD May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.712000 audit: BPF prog-id=59 op=LOAD May 17 00:48:06.712000 audit: BPF prog-id=39 op=UNLOAD May 17 00:48:06.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:06.714000 audit: BPF prog-id=60 op=LOAD May 17 00:48:06.714000 audit: BPF prog-id=38 op=UNLOAD May 17 00:48:06.728173 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:48:06.728218 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:48:06.728355 systemd[1]: Stopped kubelet.service. May 17 00:48:06.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:48:06.729513 systemd[1]: Starting kubelet.service... May 17 00:48:07.560083 systemd[1]: Started kubelet.service. May 17 00:48:07.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:07.715672 kubelet[1754]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:07.715672 kubelet[1754]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:48:07.715672 kubelet[1754]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:07.715672 kubelet[1754]: I0517 00:48:07.715614 1754 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:48:08.031929 kubelet[1754]: I0517 00:48:08.031903 1754 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:48:08.032053 kubelet[1754]: I0517 00:48:08.032045 1754 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:48:08.032263 kubelet[1754]: I0517 00:48:08.032255 1754 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:48:08.356614 kubelet[1754]: E0517 00:48:08.356533 1754 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.107:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:08.358380 kubelet[1754]: I0517 00:48:08.357716 1754 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:08.377165 kubelet[1754]: E0517 00:48:08.377137 1754 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:48:08.377165 kubelet[1754]: I0517 00:48:08.377160 1754 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:48:08.391091 kubelet[1754]: I0517 00:48:08.391068 1754 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:48:08.396181 kubelet[1754]: I0517 00:48:08.396149 1754 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:48:08.396303 kubelet[1754]: I0517 00:48:08.396178 1754 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:48:08.396411 kubelet[1754]: I0517 00:48:08.396305 1754 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:48:08.396411 kubelet[1754]: I0517 00:48:08.396312 1754 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:48:08.396411 kubelet[1754]: I0517 00:48:08.396392 1754 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:08.417972 kubelet[1754]: I0517 00:48:08.417949 1754 kubelet.go:446] "Attempting to sync node with API server" May 17 00:48:08.424618 kubelet[1754]: I0517 00:48:08.424596 1754 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:48:08.424653 kubelet[1754]: I0517 00:48:08.424622 1754 kubelet.go:352] "Adding apiserver pod source" May 17 00:48:08.424653 kubelet[1754]: I0517 00:48:08.424633 1754 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:48:08.502566 kubelet[1754]: W0517 00:48:08.502525 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.107:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:08.502762 kubelet[1754]: E0517 00:48:08.502572 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.107:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:08.509345 kubelet[1754]: W0517 00:48:08.509313 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:08.509515 kubelet[1754]: E0517 00:48:08.509500 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:08.509627 kubelet[1754]: I0517 00:48:08.509617 1754 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:48:08.509944 kubelet[1754]: I0517 00:48:08.509934 1754 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:48:08.510706 kubelet[1754]: W0517 00:48:08.510648 1754 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:48:08.531799 kubelet[1754]: I0517 00:48:08.531779 1754 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:48:08.531935 kubelet[1754]: I0517 00:48:08.531928 1754 server.go:1287] "Started kubelet" May 17 00:48:08.545564 kubelet[1754]: I0517 00:48:08.545525 1754 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:48:08.546369 kubelet[1754]: I0517 00:48:08.546232 1754 server.go:479] "Adding debug handlers to kubelet server" May 17 00:48:08.546539 kubelet[1754]: I0517 00:48:08.546511 1754 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:48:08.546736 kubelet[1754]: I0517 00:48:08.546728 1754 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:48:08.547000 audit[1754]: AVC avc: denied { mac_admin } for pid=1754 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:08.547000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:08.547000 audit[1754]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00089d7a0 a1=c000873428 a2=c00089d770 a3=25 items=0 ppid=1 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:08.547000 audit[1754]: AVC avc: denied { mac_admin } for pid=1754 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:08.547000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:08.547000 audit[1754]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aa0840 a1=c000873440 a2=c00089d830 a3=25 items=0 ppid=1 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:08.549198 kubelet[1754]: I0517 00:48:08.548832 1754 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:48:08.549198 kubelet[1754]: I0517 00:48:08.548853 1754 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:48:08.549198 kubelet[1754]: I0517 00:48:08.548886 1754 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:48:08.550468 kubelet[1754]: E0517 00:48:08.549461 1754 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.107:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.107:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18402a0c7c3a1ee3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-17 00:48:08.531910371 +0000 UTC m=+0.968240927,LastTimestamp:2025-05-17 00:48:08.531910371 +0000 UTC m=+0.968240927,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 17 00:48:08.551698 kubelet[1754]: I0517 00:48:08.551688 1754 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:48:08.552000 audit[1766]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.552000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc273a0f00 a2=0 a3=7ffc273a0eec items=0 ppid=1754 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:08.553914 kubelet[1754]: E0517 00:48:08.553905 1754 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:48:08.553979 kubelet[1754]: I0517 00:48:08.553971 1754 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:48:08.554119 kubelet[1754]: I0517 00:48:08.554110 1754 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:48:08.554187 kubelet[1754]: I0517 00:48:08.554180 1754 reconciler.go:26] "Reconciler: start to sync state" May 17 00:48:08.554460 kubelet[1754]: W0517 00:48:08.554439 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:08.554521 kubelet[1754]: E0517 00:48:08.554510 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:08.554681 kubelet[1754]: I0517 00:48:08.554671 1754 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:48:08.553000 audit[1767]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.553000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8d73e0d0 a2=0 a3=7ffe8d73e0bc items=0 ppid=1754 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:48:08.555348 kubelet[1754]: E0517 00:48:08.555330 1754 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="200ms" May 17 00:48:08.555559 kubelet[1754]: E0517 00:48:08.555548 1754 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:48:08.555843 kubelet[1754]: I0517 00:48:08.555835 1754 factory.go:221] Registration of the containerd container factory successfully May 17 00:48:08.555887 kubelet[1754]: I0517 00:48:08.555880 1754 factory.go:221] Registration of the systemd container factory successfully May 17 00:48:08.555000 audit[1769]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.555000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc4f872a20 a2=0 a3=7ffc4f872a0c items=0 ppid=1754 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:08.556000 audit[1771]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.556000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc782c0430 a2=0 a3=7ffc782c041c items=0 ppid=1754 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:08.564000 audit[1775]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.564000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd95ee1ee0 a2=0 a3=7ffd95ee1ecc items=0 ppid=1754 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:48:08.565908 kubelet[1754]: I0517 00:48:08.565879 1754 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:48:08.565000 audit[1776]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:08.565000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9069aea0 a2=0 a3=7ffe9069ae8c items=0 ppid=1754 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:48:08.566563 kubelet[1754]: I0517 00:48:08.566542 1754 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:48:08.566563 kubelet[1754]: I0517 00:48:08.566555 1754 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:48:08.566603 kubelet[1754]: I0517 00:48:08.566568 1754 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:48:08.566603 kubelet[1754]: I0517 00:48:08.566572 1754 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:48:08.566603 kubelet[1754]: E0517 00:48:08.566598 1754 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:48:08.565000 audit[1777]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.565000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc755dc7d0 a2=0 a3=7ffc755dc7bc items=0 ppid=1754 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:08.566000 audit[1778]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.566000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe210317c0 a2=0 a3=7ffe210317ac items=0 ppid=1754 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:48:08.567000 audit[1779]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:08.567000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe91b94520 a2=0 a3=7ffe91b9450c items=0 ppid=1754 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:48:08.568000 audit[1780]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:08.568000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1e289c00 a2=0 a3=7ffc1e289bec items=0 ppid=1754 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:48:08.568000 audit[1781]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:08.568000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd63df0350 a2=0 a3=7ffd63df033c items=0 ppid=1754 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:48:08.569000 audit[1782]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:08.569000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc8807c1d0 a2=0 a3=7ffc8807c1bc items=0 ppid=1754 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:48:08.571721 kubelet[1754]: W0517 00:48:08.571687 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:08.571764 kubelet[1754]: E0517 00:48:08.571729 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:08.578584 kubelet[1754]: I0517 00:48:08.578569 1754 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:48:08.578655 kubelet[1754]: I0517 00:48:08.578648 1754 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:48:08.578703 kubelet[1754]: I0517 00:48:08.578696 1754 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:08.583434 kubelet[1754]: I0517 00:48:08.583427 1754 policy_none.go:49] "None policy: Start" May 17 00:48:08.583493 kubelet[1754]: I0517 00:48:08.583486 1754 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:48:08.583538 kubelet[1754]: I0517 00:48:08.583532 1754 state_mem.go:35] "Initializing new in-memory state store" May 17 00:48:08.589815 systemd[1]: Created slice kubepods.slice. May 17 00:48:08.592676 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:48:08.594721 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:48:08.600050 kubelet[1754]: I0517 00:48:08.600035 1754 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:48:08.598000 audit[1754]: AVC avc: denied { mac_admin } for pid=1754 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:08.598000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:08.598000 audit[1754]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea2ba0 a1=c000e95458 a2=c000ea2b70 a3=25 items=0 ppid=1 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:08.598000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:08.600226 kubelet[1754]: I0517 00:48:08.600075 1754 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:48:08.600226 kubelet[1754]: I0517 00:48:08.600143 1754 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:48:08.600226 kubelet[1754]: I0517 00:48:08.600149 1754 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:48:08.600992 kubelet[1754]: I0517 00:48:08.600985 1754 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:48:08.602720 kubelet[1754]: E0517 00:48:08.602712 1754 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:48:08.602793 kubelet[1754]: E0517 00:48:08.602785 1754 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 17 00:48:08.672224 systemd[1]: Created slice kubepods-burstable-pod916d0d6c4a2b1448b5cce5d7e99f9ca1.slice. May 17 00:48:08.677862 kubelet[1754]: E0517 00:48:08.677837 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:08.679609 systemd[1]: Created slice kubepods-burstable-pod7c751acbcd1525da2f1a64e395f86bdd.slice. May 17 00:48:08.682571 kubelet[1754]: E0517 00:48:08.682560 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:08.689209 systemd[1]: Created slice kubepods-burstable-pod447e79232307504a6964f3be51e3d64d.slice. May 17 00:48:08.690097 kubelet[1754]: E0517 00:48:08.690082 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:08.700894 kubelet[1754]: I0517 00:48:08.700877 1754 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:48:08.702475 kubelet[1754]: E0517 00:48:08.701118 1754 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" May 17 00:48:08.755653 kubelet[1754]: E0517 00:48:08.755624 1754 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="400ms" May 17 00:48:08.755881 kubelet[1754]: I0517 00:48:08.755690 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:08.755881 kubelet[1754]: I0517 00:48:08.755705 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/447e79232307504a6964f3be51e3d64d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"447e79232307504a6964f3be51e3d64d\") " pod="kube-system/kube-scheduler-localhost" May 17 00:48:08.755881 kubelet[1754]: I0517 00:48:08.755748 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:08.755881 kubelet[1754]: I0517 00:48:08.755760 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:08.755881 kubelet[1754]: I0517 00:48:08.755769 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:08.756015 kubelet[1754]: I0517 00:48:08.755777 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/916d0d6c4a2b1448b5cce5d7e99f9ca1-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"916d0d6c4a2b1448b5cce5d7e99f9ca1\") " pod="kube-system/kube-apiserver-localhost" May 17 00:48:08.756015 kubelet[1754]: I0517 00:48:08.755785 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/916d0d6c4a2b1448b5cce5d7e99f9ca1-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"916d0d6c4a2b1448b5cce5d7e99f9ca1\") " pod="kube-system/kube-apiserver-localhost" May 17 00:48:08.756015 kubelet[1754]: I0517 00:48:08.755819 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/916d0d6c4a2b1448b5cce5d7e99f9ca1-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"916d0d6c4a2b1448b5cce5d7e99f9ca1\") " pod="kube-system/kube-apiserver-localhost" May 17 00:48:08.756015 kubelet[1754]: I0517 00:48:08.755830 1754 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:08.902148 kubelet[1754]: I0517 00:48:08.902122 1754 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:48:08.902454 kubelet[1754]: E0517 00:48:08.902429 1754 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" May 17 00:48:08.979718 env[1249]: time="2025-05-17T00:48:08.979169751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:916d0d6c4a2b1448b5cce5d7e99f9ca1,Namespace:kube-system,Attempt:0,}" May 17 00:48:08.983370 env[1249]: time="2025-05-17T00:48:08.983344168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7c751acbcd1525da2f1a64e395f86bdd,Namespace:kube-system,Attempt:0,}" May 17 00:48:08.991031 env[1249]: time="2025-05-17T00:48:08.991007007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:447e79232307504a6964f3be51e3d64d,Namespace:kube-system,Attempt:0,}" May 17 00:48:09.156562 kubelet[1754]: E0517 00:48:09.156407 1754 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="800ms" May 17 00:48:09.304423 kubelet[1754]: I0517 00:48:09.304248 1754 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:48:09.304713 kubelet[1754]: E0517 00:48:09.304700 1754 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" May 17 00:48:09.592076 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3391307790.mount: Deactivated successfully. May 17 00:48:09.621764 env[1249]: time="2025-05-17T00:48:09.621741048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.623980 env[1249]: time="2025-05-17T00:48:09.623928565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.624286 kubelet[1754]: W0517 00:48:09.624232 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:09.624286 kubelet[1754]: E0517 00:48:09.624271 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:09.633349 env[1249]: time="2025-05-17T00:48:09.633336083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.636456 env[1249]: time="2025-05-17T00:48:09.636439407Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.638528 env[1249]: time="2025-05-17T00:48:09.638516149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.642916 env[1249]: time="2025-05-17T00:48:09.642901218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.647463 env[1249]: time="2025-05-17T00:48:09.647451439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.651957 env[1249]: time="2025-05-17T00:48:09.651940525Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.658748 env[1249]: time="2025-05-17T00:48:09.658730653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.661261 env[1249]: time="2025-05-17T00:48:09.661248604Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.667982 env[1249]: time="2025-05-17T00:48:09.667967782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.677257 env[1249]: time="2025-05-17T00:48:09.677244393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:09.699479 env[1249]: time="2025-05-17T00:48:09.689423574Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:09.699479 env[1249]: time="2025-05-17T00:48:09.689445088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:09.699479 env[1249]: time="2025-05-17T00:48:09.689452312Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:09.699479 env[1249]: time="2025-05-17T00:48:09.689524630Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1dcf1209b4fa66047ff8db06390b295ad6360640e7fc5984b59301ac95a75d5 pid=1792 runtime=io.containerd.runc.v2 May 17 00:48:09.699648 env[1249]: time="2025-05-17T00:48:09.693326764Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:09.699648 env[1249]: time="2025-05-17T00:48:09.693344653Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:09.699648 env[1249]: time="2025-05-17T00:48:09.693355129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:09.699648 env[1249]: time="2025-05-17T00:48:09.693461514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a4616b365b94c1fcbca17a564d9e480cb7d97847e5bcdaf11fd571ff3c56762 pid=1809 runtime=io.containerd.runc.v2 May 17 00:48:09.711103 kubelet[1754]: W0517 00:48:09.711036 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.107:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:09.711103 kubelet[1754]: E0517 00:48:09.711080 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.107:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:09.716021 systemd[1]: Started cri-containerd-7a4616b365b94c1fcbca17a564d9e480cb7d97847e5bcdaf11fd571ff3c56762.scope. May 17 00:48:09.721468 env[1249]: time="2025-05-17T00:48:09.720721545Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:09.721468 env[1249]: time="2025-05-17T00:48:09.720774115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:09.721468 env[1249]: time="2025-05-17T00:48:09.720789602Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:09.721468 env[1249]: time="2025-05-17T00:48:09.720871685Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/708bf3b0399991bc54f92831f58697fa2233fb5ec143b9deb457ee82576e57d9 pid=1844 runtime=io.containerd.runc.v2 May 17 00:48:09.723417 systemd[1]: Started cri-containerd-f1dcf1209b4fa66047ff8db06390b295ad6360640e7fc5984b59301ac95a75d5.scope. May 17 00:48:09.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.735671 kernel: kauditd_printk_skb: 218 callbacks suppressed May 17 00:48:09.735715 kernel: audit: type=1400 audit(1747442889.731:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.735735 kernel: audit: type=1400 audit(1747442889.731:455): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.740399 kernel: audit: type=1400 audit(1747442889.731:456): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.740434 kernel: audit: type=1400 audit(1747442889.731:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.745785 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:48:09.745820 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:48:09.745836 kernel: audit: backlog limit exceeded May 17 00:48:09.745862 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:48:09.746559 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:48:09.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit: BPF prog-id=61 op=LOAD May 17 00:48:09.731000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1809 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343631366233363562393463316663626361313761353634643965 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1809 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343631366233363562393463316663626361313761353634643965 May 17 00:48:09.747832 kernel: audit: backlog limit exceeded May 17 00:48:09.731000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.731000 audit: BPF prog-id=62 op=LOAD May 17 00:48:09.731000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003087d0 items=0 ppid=1809 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343631366233363562393463316663626361313761353634643965 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.734000 audit: BPF prog-id=63 op=LOAD May 17 00:48:09.734000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308818 items=0 ppid=1809 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343631366233363562393463316663626361313761353634643965 May 17 00:48:09.736000 audit: BPF prog-id=63 op=UNLOAD May 17 00:48:09.736000 audit: BPF prog-id=62 op=UNLOAD May 17 00:48:09.736000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.736000 audit: BPF prog-id=64 op=LOAD May 17 00:48:09.736000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000308c28 items=0 ppid=1809 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343631366233363562393463316663626361313761353634643965 May 17 00:48:09.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.746000 audit: BPF prog-id=65 op=LOAD May 17 00:48:09.747000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.747000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1792 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631646366313230396234666136363034376666386462303633393062 May 17 00:48:09.747000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.747000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1792 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631646366313230396234666136363034376666386462303633393062 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit: BPF prog-id=66 op=LOAD May 17 00:48:09.748000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000361ff0 items=0 ppid=1792 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631646366313230396234666136363034376666386462303633393062 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.748000 audit: BPF prog-id=67 op=LOAD May 17 00:48:09.748000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003de038 items=0 ppid=1792 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631646366313230396234666136363034376666386462303633393062 May 17 00:48:09.749000 audit: BPF prog-id=67 op=UNLOAD May 17 00:48:09.749000 audit: BPF prog-id=66 op=UNLOAD May 17 00:48:09.749000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.749000 audit: BPF prog-id=68 op=LOAD May 17 00:48:09.749000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003de448 items=0 ppid=1792 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631646366313230396234666136363034376666386462303633393062 May 17 00:48:09.770533 systemd[1]: Started cri-containerd-708bf3b0399991bc54f92831f58697fa2233fb5ec143b9deb457ee82576e57d9.scope. May 17 00:48:09.774268 kubelet[1754]: W0517 00:48:09.774219 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:09.774463 kubelet[1754]: E0517 00:48:09.774275 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:09.777462 env[1249]: time="2025-05-17T00:48:09.777437694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:916d0d6c4a2b1448b5cce5d7e99f9ca1,Namespace:kube-system,Attempt:0,} returns sandbox id \"7a4616b365b94c1fcbca17a564d9e480cb7d97847e5bcdaf11fd571ff3c56762\"" May 17 00:48:09.779354 env[1249]: time="2025-05-17T00:48:09.779339037Z" level=info msg="CreateContainer within sandbox \"7a4616b365b94c1fcbca17a564d9e480cb7d97847e5bcdaf11fd571ff3c56762\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:48:09.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.788000 audit: BPF prog-id=69 op=LOAD May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1844 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730386266336230333939393931626335346639323833316635383639 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1844 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730386266336230333939393931626335346639323833316635383639 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit: BPF prog-id=70 op=LOAD May 17 00:48:09.789000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000305300 items=0 ppid=1844 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730386266336230333939393931626335346639323833316635383639 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit: BPF prog-id=71 op=LOAD May 17 00:48:09.789000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000305348 items=0 ppid=1844 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730386266336230333939393931626335346639323833316635383639 May 17 00:48:09.789000 audit: BPF prog-id=71 op=UNLOAD May 17 00:48:09.789000 audit: BPF prog-id=70 op=UNLOAD May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.789000 audit: BPF prog-id=72 op=LOAD May 17 00:48:09.789000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000305758 items=0 ppid=1844 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730386266336230333939393931626335346639323833316635383639 May 17 00:48:09.795915 env[1249]: time="2025-05-17T00:48:09.795891335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7c751acbcd1525da2f1a64e395f86bdd,Namespace:kube-system,Attempt:0,} returns sandbox id \"f1dcf1209b4fa66047ff8db06390b295ad6360640e7fc5984b59301ac95a75d5\"" May 17 00:48:09.797878 env[1249]: time="2025-05-17T00:48:09.797860792Z" level=info msg="CreateContainer within sandbox \"7a4616b365b94c1fcbca17a564d9e480cb7d97847e5bcdaf11fd571ff3c56762\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"df234f494ebc6a21c7c7f19ee2f4a26ed60720a9aa16ac8bcb9181b5e76de255\"" May 17 00:48:09.799951 env[1249]: time="2025-05-17T00:48:09.799927386Z" level=info msg="StartContainer for \"df234f494ebc6a21c7c7f19ee2f4a26ed60720a9aa16ac8bcb9181b5e76de255\"" May 17 00:48:09.800812 env[1249]: time="2025-05-17T00:48:09.800795509Z" level=info msg="CreateContainer within sandbox \"f1dcf1209b4fa66047ff8db06390b295ad6360640e7fc5984b59301ac95a75d5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:48:09.813340 systemd[1]: Started cri-containerd-df234f494ebc6a21c7c7f19ee2f4a26ed60720a9aa16ac8bcb9181b5e76de255.scope. May 17 00:48:09.821758 env[1249]: time="2025-05-17T00:48:09.821736154Z" level=info msg="CreateContainer within sandbox \"f1dcf1209b4fa66047ff8db06390b295ad6360640e7fc5984b59301ac95a75d5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"75cefa2378c5ebc4c8da54919556fdf077cdd6fb0e98cb01a19787266f73123c\"" May 17 00:48:09.822208 env[1249]: time="2025-05-17T00:48:09.822184987Z" level=info msg="StartContainer for \"75cefa2378c5ebc4c8da54919556fdf077cdd6fb0e98cb01a19787266f73123c\"" May 17 00:48:09.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit: BPF prog-id=73 op=LOAD May 17 00:48:09.824000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1809 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323334663439346562633661323163376337663139656532663461 May 17 00:48:09.824000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.824000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1809 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323334663439346562633661323163376337663139656532663461 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit: BPF prog-id=74 op=LOAD May 17 00:48:09.825000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243a0 items=0 ppid=1809 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323334663439346562633661323163376337663139656532663461 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit: BPF prog-id=75 op=LOAD May 17 00:48:09.825000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000243e8 items=0 ppid=1809 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323334663439346562633661323163376337663139656532663461 May 17 00:48:09.825000 audit: BPF prog-id=75 op=UNLOAD May 17 00:48:09.825000 audit: BPF prog-id=74 op=UNLOAD May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.825000 audit: BPF prog-id=76 op=LOAD May 17 00:48:09.825000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000247f8 items=0 ppid=1809 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323334663439346562633661323163376337663139656532663461 May 17 00:48:09.830010 env[1249]: time="2025-05-17T00:48:09.829970418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:447e79232307504a6964f3be51e3d64d,Namespace:kube-system,Attempt:0,} returns sandbox id \"708bf3b0399991bc54f92831f58697fa2233fb5ec143b9deb457ee82576e57d9\"" May 17 00:48:09.831427 env[1249]: time="2025-05-17T00:48:09.831411168Z" level=info msg="CreateContainer within sandbox \"708bf3b0399991bc54f92831f58697fa2233fb5ec143b9deb457ee82576e57d9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:48:09.843811 systemd[1]: Started cri-containerd-75cefa2378c5ebc4c8da54919556fdf077cdd6fb0e98cb01a19787266f73123c.scope. May 17 00:48:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit: BPF prog-id=77 op=LOAD May 17 00:48:09.863000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735636566613233373863356562633463386461353439313935353666 May 17 00:48:09.863000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.863000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735636566613233373863356562633463386461353439313935353666 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.865655 env[1249]: time="2025-05-17T00:48:09.865633948Z" level=info msg="StartContainer for \"df234f494ebc6a21c7c7f19ee2f4a26ed60720a9aa16ac8bcb9181b5e76de255\" returns successfully" May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit: BPF prog-id=78 op=LOAD May 17 00:48:09.864000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000385eb0 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735636566613233373863356562633463386461353439313935353666 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit: BPF prog-id=79 op=LOAD May 17 00:48:09.864000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000385ef8 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735636566613233373863356562633463386461353439313935353666 May 17 00:48:09.864000 audit: BPF prog-id=79 op=UNLOAD May 17 00:48:09.864000 audit: BPF prog-id=78 op=UNLOAD May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.864000 audit: BPF prog-id=80 op=LOAD May 17 00:48:09.864000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4308 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735636566613233373863356562633463386461353439313935353666 May 17 00:48:09.877473 env[1249]: time="2025-05-17T00:48:09.877450085Z" level=info msg="CreateContainer within sandbox \"708bf3b0399991bc54f92831f58697fa2233fb5ec143b9deb457ee82576e57d9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ce464dab1f3e41533e4fa56499552b27b48567fe277c9c8abafbca8c9be1b53b\"" May 17 00:48:09.877745 env[1249]: time="2025-05-17T00:48:09.877728981Z" level=info msg="StartContainer for \"ce464dab1f3e41533e4fa56499552b27b48567fe277c9c8abafbca8c9be1b53b\"" May 17 00:48:09.889168 systemd[1]: Started cri-containerd-ce464dab1f3e41533e4fa56499552b27b48567fe277c9c8abafbca8c9be1b53b.scope. May 17 00:48:09.897947 env[1249]: time="2025-05-17T00:48:09.897919947Z" level=info msg="StartContainer for \"75cefa2378c5ebc4c8da54919556fdf077cdd6fb0e98cb01a19787266f73123c\" returns successfully" May 17 00:48:09.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.898000 audit: BPF prog-id=81 op=LOAD May 17 00:48:09.899000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1844 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343634646162316633653431353333653466613536343939353532 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1844 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343634646162316633653431353333653466613536343939353532 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.899000 audit: BPF prog-id=82 op=LOAD May 17 00:48:09.899000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000294cf0 items=0 ppid=1844 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343634646162316633653431353333653466613536343939353532 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit: BPF prog-id=83 op=LOAD May 17 00:48:09.900000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000294d38 items=0 ppid=1844 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343634646162316633653431353333653466613536343939353532 May 17 00:48:09.900000 audit: BPF prog-id=83 op=UNLOAD May 17 00:48:09.900000 audit: BPF prog-id=82 op=UNLOAD May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:09.900000 audit: BPF prog-id=84 op=LOAD May 17 00:48:09.900000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000295148 items=0 ppid=1844 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365343634646162316633653431353333653466613536343939353532 May 17 00:48:09.924701 env[1249]: time="2025-05-17T00:48:09.924674171Z" level=info msg="StartContainer for \"ce464dab1f3e41533e4fa56499552b27b48567fe277c9c8abafbca8c9be1b53b\" returns successfully" May 17 00:48:09.957389 kubelet[1754]: E0517 00:48:09.957354 1754 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="1.6s" May 17 00:48:10.106316 kubelet[1754]: I0517 00:48:10.106049 1754 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:48:10.106316 kubelet[1754]: E0517 00:48:10.106249 1754 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" May 17 00:48:10.109578 kubelet[1754]: W0517 00:48:10.109524 1754 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused May 17 00:48:10.109578 kubelet[1754]: E0517 00:48:10.109563 1754 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:10.545806 kubelet[1754]: E0517 00:48:10.545755 1754 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.107:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.107:6443: connect: connection refused" logger="UnhandledError" May 17 00:48:10.575478 kubelet[1754]: E0517 00:48:10.575457 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:10.576747 kubelet[1754]: E0517 00:48:10.576726 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:10.577925 kubelet[1754]: E0517 00:48:10.577913 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:11.579643 kubelet[1754]: E0517 00:48:11.579400 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:11.579643 kubelet[1754]: E0517 00:48:11.579572 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:11.580091 kubelet[1754]: E0517 00:48:11.580025 1754 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:48:11.707105 kubelet[1754]: I0517 00:48:11.707080 1754 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:48:11.731000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:11.731000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000154280 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:11.731000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:11.731000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:11.731000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005c6780 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:11.731000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:12.463000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:12.463000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0088c4a20 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:48:12.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:48:12.463000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:12.463000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c001a8b4a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:48:12.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:48:12.467000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:12.467000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006434810 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:48:12.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:48:12.472000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:12.472000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c0064348d0 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:48:12.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:48:12.481000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:12.481000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=55 a1=c00215d340 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:48:12.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:48:12.482000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:12.482000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=55 a1=c006434c30 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:48:12.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:48:12.606166 kubelet[1754]: E0517 00:48:12.606126 1754 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 17 00:48:12.724617 kubelet[1754]: I0517 00:48:12.724527 1754 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 17 00:48:12.724617 kubelet[1754]: E0517 00:48:12.724556 1754 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 17 00:48:12.756032 kubelet[1754]: I0517 00:48:12.756003 1754 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:48:12.759143 kubelet[1754]: E0517 00:48:12.759122 1754 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 17 00:48:12.759261 kubelet[1754]: I0517 00:48:12.759254 1754 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:48:12.760301 kubelet[1754]: E0517 00:48:12.760284 1754 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 17 00:48:12.760301 kubelet[1754]: I0517 00:48:12.760298 1754 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:48:12.761202 kubelet[1754]: E0517 00:48:12.761188 1754 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 17 00:48:13.484526 kubelet[1754]: I0517 00:48:13.484499 1754 apiserver.go:52] "Watching apiserver" May 17 00:48:13.554424 kubelet[1754]: I0517 00:48:13.554408 1754 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:48:14.379526 systemd[1]: Reloading. May 17 00:48:14.450206 /usr/lib/systemd/system-generators/torcx-generator[2044]: time="2025-05-17T00:48:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:48:14.450227 /usr/lib/systemd/system-generators/torcx-generator[2044]: time="2025-05-17T00:48:14Z" level=info msg="torcx already run" May 17 00:48:14.503500 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:48:14.503638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:48:14.515951 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:48:14.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.566000 audit: BPF prog-id=85 op=LOAD May 17 00:48:14.566000 audit: BPF prog-id=46 op=UNLOAD May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit: BPF prog-id=86 op=LOAD May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.567000 audit: BPF prog-id=87 op=LOAD May 17 00:48:14.567000 audit: BPF prog-id=47 op=UNLOAD May 17 00:48:14.567000 audit: BPF prog-id=48 op=UNLOAD May 17 00:48:14.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.568000 audit: BPF prog-id=88 op=LOAD May 17 00:48:14.568000 audit: BPF prog-id=69 op=UNLOAD May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit: BPF prog-id=89 op=LOAD May 17 00:48:14.569000 audit: BPF prog-id=81 op=UNLOAD May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.570000 audit: BPF prog-id=90 op=LOAD May 17 00:48:14.570000 audit: BPF prog-id=49 op=UNLOAD May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit: BPF prog-id=91 op=LOAD May 17 00:48:14.571000 audit: BPF prog-id=50 op=UNLOAD May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.571000 audit: BPF prog-id=92 op=LOAD May 17 00:48:14.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit: BPF prog-id=93 op=LOAD May 17 00:48:14.572000 audit: BPF prog-id=51 op=UNLOAD May 17 00:48:14.572000 audit: BPF prog-id=52 op=UNLOAD May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.572000 audit: BPF prog-id=94 op=LOAD May 17 00:48:14.572000 audit: BPF prog-id=53 op=UNLOAD May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit: BPF prog-id=95 op=LOAD May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit: BPF prog-id=96 op=LOAD May 17 00:48:14.574000 audit: BPF prog-id=54 op=UNLOAD May 17 00:48:14.574000 audit: BPF prog-id=55 op=UNLOAD May 17 00:48:14.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.574000 audit: BPF prog-id=97 op=LOAD May 17 00:48:14.574000 audit: BPF prog-id=61 op=UNLOAD May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit: BPF prog-id=98 op=LOAD May 17 00:48:14.575000 audit: BPF prog-id=65 op=UNLOAD May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit: BPF prog-id=99 op=LOAD May 17 00:48:14.576000 audit: BPF prog-id=56 op=UNLOAD May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit: BPF prog-id=100 op=LOAD May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.576000 audit: BPF prog-id=101 op=LOAD May 17 00:48:14.576000 audit: BPF prog-id=57 op=UNLOAD May 17 00:48:14.576000 audit: BPF prog-id=58 op=UNLOAD May 17 00:48:14.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit: BPF prog-id=102 op=LOAD May 17 00:48:14.578000 audit: BPF prog-id=59 op=UNLOAD May 17 00:48:14.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.578000 audit: BPF prog-id=103 op=LOAD May 17 00:48:14.578000 audit: BPF prog-id=73 op=UNLOAD May 17 00:48:14.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.579000 audit: BPF prog-id=104 op=LOAD May 17 00:48:14.579000 audit: BPF prog-id=77 op=UNLOAD May 17 00:48:14.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:14.581000 audit: BPF prog-id=105 op=LOAD May 17 00:48:14.581000 audit: BPF prog-id=60 op=UNLOAD May 17 00:48:14.595829 kubelet[1754]: I0517 00:48:14.595726 1754 dynamic_cafile_content.go:175] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:14.596252 systemd[1]: Stopping kubelet.service... May 17 00:48:14.620701 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:48:14.620864 systemd[1]: Stopped kubelet.service. May 17 00:48:14.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:14.622690 systemd[1]: Starting kubelet.service... May 17 00:48:15.977494 systemd[1]: Started kubelet.service. May 17 00:48:15.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:15.979079 kernel: kauditd_printk_skb: 605 callbacks suppressed May 17 00:48:15.979121 kernel: audit: type=1130 audit(1747442895.976:813): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:16.029617 kubelet[2109]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:16.030599 kubelet[2109]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:48:16.030738 kubelet[2109]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:48:16.031189 kubelet[2109]: I0517 00:48:16.031165 2109 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:48:16.039349 kubelet[2109]: I0517 00:48:16.039328 2109 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:48:16.039495 kubelet[2109]: I0517 00:48:16.039487 2109 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:48:16.040252 kubelet[2109]: I0517 00:48:16.040244 2109 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:48:16.064227 kubelet[2109]: I0517 00:48:16.064208 2109 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:48:16.092288 kubelet[2109]: I0517 00:48:16.092267 2109 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:48:16.095093 kubelet[2109]: E0517 00:48:16.095074 2109 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:48:16.095178 kubelet[2109]: I0517 00:48:16.095171 2109 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:48:16.098072 kubelet[2109]: I0517 00:48:16.098062 2109 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:48:16.099613 kubelet[2109]: I0517 00:48:16.099588 2109 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:48:16.099819 kubelet[2109]: I0517 00:48:16.099717 2109 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:48:16.099889 kubelet[2109]: I0517 00:48:16.099825 2109 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:48:16.099889 kubelet[2109]: I0517 00:48:16.099836 2109 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:48:16.111914 kubelet[2109]: I0517 00:48:16.111888 2109 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:16.112052 kubelet[2109]: I0517 00:48:16.112041 2109 kubelet.go:446] "Attempting to sync node with API server" May 17 00:48:16.112093 kubelet[2109]: I0517 00:48:16.112058 2109 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:48:16.112093 kubelet[2109]: I0517 00:48:16.112070 2109 kubelet.go:352] "Adding apiserver pod source" May 17 00:48:16.112093 kubelet[2109]: I0517 00:48:16.112077 2109 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:48:16.115459 kubelet[2109]: I0517 00:48:16.115447 2109 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:48:16.141508 kubelet[2109]: I0517 00:48:16.141488 2109 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:48:16.155397 kubelet[2109]: I0517 00:48:16.155378 2109 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:48:16.155472 kubelet[2109]: I0517 00:48:16.155404 2109 server.go:1287] "Started kubelet" May 17 00:48:16.155733 kubelet[2109]: I0517 00:48:16.155707 2109 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:48:16.157860 kubelet[2109]: I0517 00:48:16.157851 2109 server.go:479] "Adding debug handlers to kubelet server" May 17 00:48:16.158806 kubelet[2109]: I0517 00:48:16.158775 2109 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:48:16.158950 kubelet[2109]: I0517 00:48:16.158937 2109 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:48:16.160087 kubelet[2109]: E0517 00:48:16.159935 2109 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:48:16.158000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:16.160447 kubelet[2109]: I0517 00:48:16.160436 2109 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:48:16.160520 kubelet[2109]: I0517 00:48:16.160511 2109 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:48:16.160584 kubelet[2109]: I0517 00:48:16.160568 2109 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:48:16.161516 kubelet[2109]: I0517 00:48:16.161508 2109 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:48:16.158000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:16.163820 kubelet[2109]: I0517 00:48:16.163811 2109 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:48:16.163910 kubelet[2109]: I0517 00:48:16.163902 2109 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:48:16.164017 kubelet[2109]: I0517 00:48:16.164010 2109 reconciler.go:26] "Reconciler: start to sync state" May 17 00:48:16.164086 kernel: audit: type=1400 audit(1747442896.158:814): avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:16.164112 kernel: audit: type=1401 audit(1747442896.158:814): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:16.158000 audit[2109]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac42d0 a1=c000759ec0 a2=c000ac42a0 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:16.167091 kubelet[2109]: I0517 00:48:16.167081 2109 factory.go:221] Registration of the systemd container factory successfully May 17 00:48:16.167201 kubelet[2109]: I0517 00:48:16.167191 2109 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:48:16.168019 kubelet[2109]: I0517 00:48:16.168010 2109 factory.go:221] Registration of the containerd container factory successfully May 17 00:48:16.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:16.173539 kernel: audit: type=1300 audit(1747442896.158:814): arch=c000003e syscall=188 success=no exit=-22 a0=c000ac42d0 a1=c000759ec0 a2=c000ac42a0 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:16.173580 kernel: audit: type=1327 audit(1747442896.158:814): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:16.173627 kernel: audit: type=1400 audit(1747442896.158:815): avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:16.158000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:16.158000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:16.177918 kernel: audit: type=1401 audit(1747442896.158:815): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:16.177948 kernel: audit: type=1300 audit(1747442896.158:815): arch=c000003e syscall=188 success=no exit=-22 a0=c000a6e200 a1=c000759ed8 a2=c000ac4360 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:16.158000 audit[2109]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a6e200 a1=c000759ed8 a2=c000ac4360 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:16.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:16.184802 kernel: audit: type=1327 audit(1747442896.158:815): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:16.189147 kubelet[2109]: I0517 00:48:16.189121 2109 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:48:16.191295 kubelet[2109]: I0517 00:48:16.191278 2109 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:48:16.191295 kubelet[2109]: I0517 00:48:16.191294 2109 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:48:16.191379 kubelet[2109]: I0517 00:48:16.191307 2109 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:48:16.191379 kubelet[2109]: I0517 00:48:16.191311 2109 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:48:16.191379 kubelet[2109]: E0517 00:48:16.191342 2109 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:48:16.218252 kubelet[2109]: I0517 00:48:16.218233 2109 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:48:16.218364 kubelet[2109]: I0517 00:48:16.218350 2109 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:48:16.218413 kubelet[2109]: I0517 00:48:16.218406 2109 state_mem.go:36] "Initialized new in-memory state store" May 17 00:48:16.218546 kubelet[2109]: I0517 00:48:16.218538 2109 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:48:16.218603 kubelet[2109]: I0517 00:48:16.218587 2109 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:48:16.218646 kubelet[2109]: I0517 00:48:16.218640 2109 policy_none.go:49] "None policy: Start" May 17 00:48:16.218697 kubelet[2109]: I0517 00:48:16.218690 2109 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:48:16.218742 kubelet[2109]: I0517 00:48:16.218735 2109 state_mem.go:35] "Initializing new in-memory state store" May 17 00:48:16.218850 kubelet[2109]: I0517 00:48:16.218843 2109 state_mem.go:75] "Updated machine memory state" May 17 00:48:16.220760 kubelet[2109]: I0517 00:48:16.220752 2109 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:48:16.219000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:16.220892 kubelet[2109]: I0517 00:48:16.220881 2109 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:48:16.220999 kubelet[2109]: I0517 00:48:16.220991 2109 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:48:16.221054 kubelet[2109]: I0517 00:48:16.221038 2109 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:48:16.222366 kubelet[2109]: I0517 00:48:16.222353 2109 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:48:16.224318 kernel: audit: type=1400 audit(1747442896.219:816): avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:16.219000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:48:16.219000 audit[2109]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009899b0 a1=c000c5e9d8 a2=c000989980 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:16.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:48:16.225278 kubelet[2109]: E0517 00:48:16.225234 2109 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:48:16.292756 kubelet[2109]: I0517 00:48:16.291902 2109 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:48:16.319196 kubelet[2109]: I0517 00:48:16.319179 2109 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:48:16.319515 kubelet[2109]: I0517 00:48:16.319507 2109 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:48:16.325088 kubelet[2109]: I0517 00:48:16.325075 2109 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:48:16.329080 kubelet[2109]: I0517 00:48:16.329065 2109 kubelet_node_status.go:124] "Node was previously registered" node="localhost" May 17 00:48:16.329208 kubelet[2109]: I0517 00:48:16.329201 2109 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 17 00:48:16.366628 kubelet[2109]: I0517 00:48:16.366605 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/916d0d6c4a2b1448b5cce5d7e99f9ca1-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"916d0d6c4a2b1448b5cce5d7e99f9ca1\") " pod="kube-system/kube-apiserver-localhost" May 17 00:48:16.366717 kubelet[2109]: I0517 00:48:16.366639 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:16.366717 kubelet[2109]: I0517 00:48:16.366651 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:16.366717 kubelet[2109]: I0517 00:48:16.366661 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/447e79232307504a6964f3be51e3d64d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"447e79232307504a6964f3be51e3d64d\") " pod="kube-system/kube-scheduler-localhost" May 17 00:48:16.366717 kubelet[2109]: I0517 00:48:16.366670 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/916d0d6c4a2b1448b5cce5d7e99f9ca1-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"916d0d6c4a2b1448b5cce5d7e99f9ca1\") " pod="kube-system/kube-apiserver-localhost" May 17 00:48:16.366804 kubelet[2109]: I0517 00:48:16.366719 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/916d0d6c4a2b1448b5cce5d7e99f9ca1-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"916d0d6c4a2b1448b5cce5d7e99f9ca1\") " pod="kube-system/kube-apiserver-localhost" May 17 00:48:16.366804 kubelet[2109]: I0517 00:48:16.366732 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:16.366804 kubelet[2109]: I0517 00:48:16.366742 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:16.366804 kubelet[2109]: I0517 00:48:16.366750 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:48:16.851000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:16.851000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a59ea0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:16.851000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:16.852000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:16.852000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba8060 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:16.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:16.852000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:16.852000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba8220 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:16.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:16.852000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:48:16.852000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba83e0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:16.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:17.137626 kubelet[2109]: I0517 00:48:17.137597 2109 apiserver.go:52] "Watching apiserver" May 17 00:48:17.164741 kubelet[2109]: I0517 00:48:17.164710 2109 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:48:17.210947 kubelet[2109]: I0517 00:48:17.210933 2109 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:48:17.211352 kubelet[2109]: I0517 00:48:17.211344 2109 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:48:17.215303 kubelet[2109]: E0517 00:48:17.215287 2109 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 17 00:48:17.215656 kubelet[2109]: E0517 00:48:17.215646 2109 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 17 00:48:17.242293 kubelet[2109]: I0517 00:48:17.242258 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.242237459 podStartE2EDuration="1.242237459s" podCreationTimestamp="2025-05-17 00:48:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:17.234285634 +0000 UTC m=+1.244772436" watchObservedRunningTime="2025-05-17 00:48:17.242237459 +0000 UTC m=+1.252724260" May 17 00:48:17.246459 kubelet[2109]: I0517 00:48:17.246418 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.246404091 podStartE2EDuration="1.246404091s" podCreationTimestamp="2025-05-17 00:48:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:17.242632854 +0000 UTC m=+1.253119655" watchObservedRunningTime="2025-05-17 00:48:17.246404091 +0000 UTC m=+1.256890900" May 17 00:48:18.902000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7349 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:48:18.902000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000447bc0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:48:18.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:48:21.114057 kubelet[2109]: I0517 00:48:21.114038 2109 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:48:21.114615 env[1249]: time="2025-05-17T00:48:21.114582011Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:48:21.114766 kubelet[2109]: I0517 00:48:21.114709 2109 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:48:21.984351 kubelet[2109]: I0517 00:48:21.984299 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=5.9842798 podStartE2EDuration="5.9842798s" podCreationTimestamp="2025-05-17 00:48:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:17.246662047 +0000 UTC m=+1.257148856" watchObservedRunningTime="2025-05-17 00:48:21.9842798 +0000 UTC m=+5.994766613" May 17 00:48:21.991237 systemd[1]: Created slice kubepods-besteffort-pod7fd99fba_25bd_4e34_82d9_7cc263268c04.slice. May 17 00:48:22.000748 kubelet[2109]: I0517 00:48:22.000705 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7fd99fba-25bd-4e34-82d9-7cc263268c04-kube-proxy\") pod \"kube-proxy-pqk52\" (UID: \"7fd99fba-25bd-4e34-82d9-7cc263268c04\") " pod="kube-system/kube-proxy-pqk52" May 17 00:48:22.000885 kubelet[2109]: I0517 00:48:22.000753 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2wp4z\" (UniqueName: \"kubernetes.io/projected/7fd99fba-25bd-4e34-82d9-7cc263268c04-kube-api-access-2wp4z\") pod \"kube-proxy-pqk52\" (UID: \"7fd99fba-25bd-4e34-82d9-7cc263268c04\") " pod="kube-system/kube-proxy-pqk52" May 17 00:48:22.000885 kubelet[2109]: I0517 00:48:22.000778 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7fd99fba-25bd-4e34-82d9-7cc263268c04-xtables-lock\") pod \"kube-proxy-pqk52\" (UID: \"7fd99fba-25bd-4e34-82d9-7cc263268c04\") " pod="kube-system/kube-proxy-pqk52" May 17 00:48:22.000885 kubelet[2109]: I0517 00:48:22.000794 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7fd99fba-25bd-4e34-82d9-7cc263268c04-lib-modules\") pod \"kube-proxy-pqk52\" (UID: \"7fd99fba-25bd-4e34-82d9-7cc263268c04\") " pod="kube-system/kube-proxy-pqk52" May 17 00:48:22.074455 systemd[1]: Created slice kubepods-besteffort-pod54a8f813_71d5_496a_921e_b3e37e910f5c.slice. May 17 00:48:22.101766 kubelet[2109]: I0517 00:48:22.101745 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/54a8f813-71d5-496a-921e-b3e37e910f5c-var-lib-calico\") pod \"tigera-operator-844669ff44-5cnbc\" (UID: \"54a8f813-71d5-496a-921e-b3e37e910f5c\") " pod="tigera-operator/tigera-operator-844669ff44-5cnbc" May 17 00:48:22.101907 kubelet[2109]: I0517 00:48:22.101896 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7555x\" (UniqueName: \"kubernetes.io/projected/54a8f813-71d5-496a-921e-b3e37e910f5c-kube-api-access-7555x\") pod \"tigera-operator-844669ff44-5cnbc\" (UID: \"54a8f813-71d5-496a-921e-b3e37e910f5c\") " pod="tigera-operator/tigera-operator-844669ff44-5cnbc" May 17 00:48:22.107220 kubelet[2109]: I0517 00:48:22.107199 2109 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:48:22.299246 env[1249]: time="2025-05-17T00:48:22.298775748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pqk52,Uid:7fd99fba-25bd-4e34-82d9-7cc263268c04,Namespace:kube-system,Attempt:0,}" May 17 00:48:22.309740 env[1249]: time="2025-05-17T00:48:22.309699208Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:22.309884 env[1249]: time="2025-05-17T00:48:22.309868917Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:22.309958 env[1249]: time="2025-05-17T00:48:22.309945183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:22.310259 env[1249]: time="2025-05-17T00:48:22.310232941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f61ddc96b4934b8bccfb7d8c2b805fe09c81cdf5f2dded367a1ae0d86e400c0b pid=2161 runtime=io.containerd.runc.v2 May 17 00:48:22.324104 systemd[1]: Started cri-containerd-f61ddc96b4934b8bccfb7d8c2b805fe09c81cdf5f2dded367a1ae0d86e400c0b.scope. May 17 00:48:22.348941 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:48:22.349036 kernel: audit: type=1400 audit(1747442902.343:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.349060 kernel: audit: type=1400 audit(1747442902.343:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.355423 kernel: audit: type=1400 audit(1747442902.343:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.355492 kernel: audit: type=1400 audit(1747442902.343:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.358527 kernel: audit: type=1400 audit(1747442902.343:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.364822 kernel: audit: type=1400 audit(1747442902.343:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.364902 kernel: audit: type=1400 audit(1747442902.343:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.371070 kernel: audit: type=1400 audit(1747442902.343:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.371168 kernel: audit: type=1400 audit(1747442902.343:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.374219 kernel: audit: type=1400 audit(1747442902.347:831): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.378042 env[1249]: time="2025-05-17T00:48:22.377978199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-5cnbc,Uid:54a8f813-71d5-496a-921e-b3e37e910f5c,Namespace:tigera-operator,Attempt:0,}" May 17 00:48:22.347000 audit: BPF prog-id=106 op=LOAD May 17 00:48:22.350000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316464633936623439333462386263636662376438633262383035 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316464633936623439333462386263636662376438633262383035 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.350000 audit: BPF prog-id=107 op=LOAD May 17 00:48:22.350000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002181d0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316464633936623439333462386263636662376438633262383035 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.360000 audit: BPF prog-id=108 op=LOAD May 17 00:48:22.360000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000218218 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316464633936623439333462386263636662376438633262383035 May 17 00:48:22.366000 audit: BPF prog-id=108 op=UNLOAD May 17 00:48:22.366000 audit: BPF prog-id=107 op=UNLOAD May 17 00:48:22.366000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.366000 audit: BPF prog-id=109 op=LOAD May 17 00:48:22.366000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000218628 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316464633936623439333462386263636662376438633262383035 May 17 00:48:22.393561 env[1249]: time="2025-05-17T00:48:22.393512721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pqk52,Uid:7fd99fba-25bd-4e34-82d9-7cc263268c04,Namespace:kube-system,Attempt:0,} returns sandbox id \"f61ddc96b4934b8bccfb7d8c2b805fe09c81cdf5f2dded367a1ae0d86e400c0b\"" May 17 00:48:22.396196 env[1249]: time="2025-05-17T00:48:22.394619579Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:22.396196 env[1249]: time="2025-05-17T00:48:22.394654347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:22.396196 env[1249]: time="2025-05-17T00:48:22.394665600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:22.397158 env[1249]: time="2025-05-17T00:48:22.396454689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/501abc0ec8c41ce6ba15be08690dac92ea36b52c1779d61019e873b610ae3bb9 pid=2202 runtime=io.containerd.runc.v2 May 17 00:48:22.397353 env[1249]: time="2025-05-17T00:48:22.397317523Z" level=info msg="CreateContainer within sandbox \"f61ddc96b4934b8bccfb7d8c2b805fe09c81cdf5f2dded367a1ae0d86e400c0b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:48:22.403917 env[1249]: time="2025-05-17T00:48:22.403857855Z" level=info msg="CreateContainer within sandbox \"f61ddc96b4934b8bccfb7d8c2b805fe09c81cdf5f2dded367a1ae0d86e400c0b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"647e67f5c8a2d91a35e64376da0a65ac350ddc86dbad79febdf2fe9e672cbf8a\"" May 17 00:48:22.404795 env[1249]: time="2025-05-17T00:48:22.404778579Z" level=info msg="StartContainer for \"647e67f5c8a2d91a35e64376da0a65ac350ddc86dbad79febdf2fe9e672cbf8a\"" May 17 00:48:22.414645 systemd[1]: Started cri-containerd-501abc0ec8c41ce6ba15be08690dac92ea36b52c1779d61019e873b610ae3bb9.scope. May 17 00:48:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.429000 audit: BPF prog-id=110 op=LOAD May 17 00:48:22.431530 systemd[1]: Started cri-containerd-647e67f5c8a2d91a35e64376da0a65ac350ddc86dbad79febdf2fe9e672cbf8a.scope. May 17 00:48:22.432000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.432000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316162633065633863343163653662613135626530383639306461 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316162633065633863343163653662613135626530383639306461 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit: BPF prog-id=111 op=LOAD May 17 00:48:22.434000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000381340 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316162633065633863343163653662613135626530383639306461 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.434000 audit: BPF prog-id=112 op=LOAD May 17 00:48:22.434000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000381388 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316162633065633863343163653662613135626530383639306461 May 17 00:48:22.435000 audit: BPF prog-id=112 op=UNLOAD May 17 00:48:22.435000 audit: BPF prog-id=111 op=UNLOAD May 17 00:48:22.435000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.435000 audit: BPF prog-id=113 op=LOAD May 17 00:48:22.435000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000381798 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316162633065633863343163653662613135626530383639306461 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f8deddcd808 items=0 ppid=2161 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376536376635633861326439316133356536343337366461306136 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit: BPF prog-id=114 op=LOAD May 17 00:48:22.444000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002fa408 items=0 ppid=2161 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376536376635633861326439316133356536343337366461306136 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit: BPF prog-id=115 op=LOAD May 17 00:48:22.444000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002fa458 items=0 ppid=2161 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376536376635633861326439316133356536343337366461306136 May 17 00:48:22.444000 audit: BPF prog-id=115 op=UNLOAD May 17 00:48:22.444000 audit: BPF prog-id=114 op=UNLOAD May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:22.444000 audit: BPF prog-id=116 op=LOAD May 17 00:48:22.444000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002fa4e8 items=0 ppid=2161 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:22.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376536376635633861326439316133356536343337366461306136 May 17 00:48:22.461096 env[1249]: time="2025-05-17T00:48:22.461051223Z" level=info msg="StartContainer for \"647e67f5c8a2d91a35e64376da0a65ac350ddc86dbad79febdf2fe9e672cbf8a\" returns successfully" May 17 00:48:22.464837 env[1249]: time="2025-05-17T00:48:22.464814662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-5cnbc,Uid:54a8f813-71d5-496a-921e-b3e37e910f5c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"501abc0ec8c41ce6ba15be08690dac92ea36b52c1779d61019e873b610ae3bb9\"" May 17 00:48:22.466007 env[1249]: time="2025-05-17T00:48:22.465993856Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:48:23.143000 audit[2304]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.143000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdaa041e70 a2=0 a3=7ffdaa041e5c items=0 ppid=2248 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:48:23.144000 audit[2305]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.144000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcc3b69c0 a2=0 a3=7ffdcc3b69ac items=0 ppid=2248 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:48:23.145000 audit[2306]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.145000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4b8a6dd0 a2=0 a3=7ffd4b8a6dbc items=0 ppid=2248 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:48:23.149000 audit[2307]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.149000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe88d0b4c0 a2=0 a3=7ffe88d0b4ac items=0 ppid=2248 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:48:23.150000 audit[2308]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.150000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe384cc290 a2=0 a3=7ffe384cc27c items=0 ppid=2248 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:48:23.150000 audit[2309]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.150000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc455074d0 a2=0 a3=7ffc455074bc items=0 ppid=2248 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:48:23.262000 audit[2310]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.262000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe918c8410 a2=0 a3=7ffe918c83fc items=0 ppid=2248 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:48:23.266000 audit[2312]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.266000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffdad370b0 a2=0 a3=7fffdad3709c items=0 ppid=2248 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:48:23.271000 audit[2315]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.271000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe8eb8dad0 a2=0 a3=7ffe8eb8dabc items=0 ppid=2248 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:48:23.272000 audit[2316]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.272000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbfe6dfd0 a2=0 a3=7fffbfe6dfbc items=0 ppid=2248 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:48:23.274000 audit[2318]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.274000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe313c6730 a2=0 a3=7ffe313c671c items=0 ppid=2248 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:48:23.275000 audit[2319]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.275000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7456eca0 a2=0 a3=7fff7456ec8c items=0 ppid=2248 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:48:23.277000 audit[2321]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.277000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc4853e520 a2=0 a3=7ffc4853e50c items=0 ppid=2248 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:48:23.280000 audit[2324]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.280000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd0c74c20 a2=0 a3=7ffdd0c74c0c items=0 ppid=2248 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:48:23.281000 audit[2325]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.281000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5d6b10d0 a2=0 a3=7ffe5d6b10bc items=0 ppid=2248 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:48:23.284000 audit[2327]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.284000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc8dbeff0 a2=0 a3=7fffc8dbefdc items=0 ppid=2248 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:48:23.285000 audit[2328]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.285000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff28da21c0 a2=0 a3=7fff28da21ac items=0 ppid=2248 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:48:23.287000 audit[2330]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.287000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec3df6330 a2=0 a3=7ffec3df631c items=0 ppid=2248 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:48:23.291000 audit[2333]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.291000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca7ee0d50 a2=0 a3=7ffca7ee0d3c items=0 ppid=2248 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:48:23.294000 audit[2336]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.294000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5bb28150 a2=0 a3=7ffd5bb2813c items=0 ppid=2248 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:48:23.295000 audit[2337]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.295000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe6fadd150 a2=0 a3=7ffe6fadd13c items=0 ppid=2248 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:48:23.298000 audit[2339]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.298000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc8bcb0e90 a2=0 a3=7ffc8bcb0e7c items=0 ppid=2248 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:23.301000 audit[2342]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.301000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc04d44580 a2=0 a3=7ffc04d4456c items=0 ppid=2248 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:23.302000 audit[2343]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.302000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe16617c10 a2=0 a3=7ffe16617bfc items=0 ppid=2248 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:48:23.304000 audit[2345]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:48:23.304000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffae1f5ba0 a2=0 a3=7fffae1f5b8c items=0 ppid=2248 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:48:23.353000 audit[2351]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:23.353000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd40f5f800 a2=0 a3=7ffd40f5f7ec items=0 ppid=2248 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:23.362000 audit[2351]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:23.362000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd40f5f800 a2=0 a3=7ffd40f5f7ec items=0 ppid=2248 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:23.363000 audit[2356]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.363000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc27547710 a2=0 a3=7ffc275476fc items=0 ppid=2248 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:48:23.365000 audit[2358]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.365000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6d06a780 a2=0 a3=7ffe6d06a76c items=0 ppid=2248 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:48:23.368000 audit[2361]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.368000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcffdea50 a2=0 a3=7fffcffdea3c items=0 ppid=2248 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:48:23.369000 audit[2362]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.369000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd27850b10 a2=0 a3=7ffd27850afc items=0 ppid=2248 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:48:23.371000 audit[2364]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.371000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd0fae480 a2=0 a3=7ffdd0fae46c items=0 ppid=2248 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:48:23.372000 audit[2365]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.372000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee4ad5270 a2=0 a3=7ffee4ad525c items=0 ppid=2248 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:48:23.374000 audit[2367]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.374000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc86e2dc40 a2=0 a3=7ffc86e2dc2c items=0 ppid=2248 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:48:23.377000 audit[2370]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.377000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff2034bc10 a2=0 a3=7fff2034bbfc items=0 ppid=2248 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:48:23.378000 audit[2371]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.378000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfa3f4f40 a2=0 a3=7ffcfa3f4f2c items=0 ppid=2248 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:48:23.380000 audit[2373]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.380000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe44c58e10 a2=0 a3=7ffe44c58dfc items=0 ppid=2248 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:48:23.381000 audit[2374]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.381000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4b2b8980 a2=0 a3=7fff4b2b896c items=0 ppid=2248 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:48:23.386000 audit[2376]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.386000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcfa98df90 a2=0 a3=7ffcfa98df7c items=0 ppid=2248 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:48:23.389000 audit[2379]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.389000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe292c95b0 a2=0 a3=7ffe292c959c items=0 ppid=2248 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:48:23.391000 audit[2382]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.391000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd747145b0 a2=0 a3=7ffd7471459c items=0 ppid=2248 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:48:23.392000 audit[2383]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.392000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd88e0e340 a2=0 a3=7ffd88e0e32c items=0 ppid=2248 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:48:23.394000 audit[2385]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.394000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe3e194480 a2=0 a3=7ffe3e19446c items=0 ppid=2248 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:23.400000 audit[2388]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.400000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffce3475a80 a2=0 a3=7ffce3475a6c items=0 ppid=2248 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:48:23.400000 audit[2389]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.400000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9d944930 a2=0 a3=7ffe9d94491c items=0 ppid=2248 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:48:23.402000 audit[2391]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.402000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe4c96ec90 a2=0 a3=7ffe4c96ec7c items=0 ppid=2248 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:48:23.403000 audit[2392]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.403000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc12c9d5e0 a2=0 a3=7ffc12c9d5cc items=0 ppid=2248 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:48:23.404000 audit[2394]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.404000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd4a5c2f0 a2=0 a3=7ffdd4a5c2dc items=0 ppid=2248 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:23.407000 audit[2397]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:48:23.407000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd274fe600 a2=0 a3=7ffd274fe5ec items=0 ppid=2248 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:48:23.409000 audit[2399]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:48:23.409000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffdd9755b0 a2=0 a3=7fffdd97559c items=0 ppid=2248 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.409000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:23.410000 audit[2399]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:48:23.410000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffdd9755b0 a2=0 a3=7fffdd97559c items=0 ppid=2248 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:23.410000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:23.829515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4080258132.mount: Deactivated successfully. May 17 00:48:24.636523 env[1249]: time="2025-05-17T00:48:24.636485600Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.643207 env[1249]: time="2025-05-17T00:48:24.643182810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.646485 env[1249]: time="2025-05-17T00:48:24.646461341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.647905 env[1249]: time="2025-05-17T00:48:24.647884887Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:24.648345 env[1249]: time="2025-05-17T00:48:24.648315594Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:48:24.650766 env[1249]: time="2025-05-17T00:48:24.650393843Z" level=info msg="CreateContainer within sandbox \"501abc0ec8c41ce6ba15be08690dac92ea36b52c1779d61019e873b610ae3bb9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:48:24.664758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3916047362.mount: Deactivated successfully. May 17 00:48:24.667787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3268538187.mount: Deactivated successfully. May 17 00:48:24.679315 env[1249]: time="2025-05-17T00:48:24.679291164Z" level=info msg="CreateContainer within sandbox \"501abc0ec8c41ce6ba15be08690dac92ea36b52c1779d61019e873b610ae3bb9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"6f6352c37aac5f790cd9d197f62f41518f32d921110f26e3d0b00dae1dee3c0b\"" May 17 00:48:24.680848 env[1249]: time="2025-05-17T00:48:24.680833479Z" level=info msg="StartContainer for \"6f6352c37aac5f790cd9d197f62f41518f32d921110f26e3d0b00dae1dee3c0b\"" May 17 00:48:24.698514 systemd[1]: Started cri-containerd-6f6352c37aac5f790cd9d197f62f41518f32d921110f26e3d0b00dae1dee3c0b.scope. May 17 00:48:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit: BPF prog-id=117 op=LOAD May 17 00:48:24.708000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2202 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363335326333376161633566373930636439643139376636326634 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2202 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363335326333376161633566373930636439643139376636326634 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.708000 audit: BPF prog-id=118 op=LOAD May 17 00:48:24.708000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001dccf0 items=0 ppid=2202 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363335326333376161633566373930636439643139376636326634 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit: BPF prog-id=119 op=LOAD May 17 00:48:24.709000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001dcd38 items=0 ppid=2202 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363335326333376161633566373930636439643139376636326634 May 17 00:48:24.709000 audit: BPF prog-id=119 op=UNLOAD May 17 00:48:24.709000 audit: BPF prog-id=118 op=UNLOAD May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:24.709000 audit: BPF prog-id=120 op=LOAD May 17 00:48:24.709000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001dd148 items=0 ppid=2202 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:24.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363335326333376161633566373930636439643139376636326634 May 17 00:48:24.750697 env[1249]: time="2025-05-17T00:48:24.750610205Z" level=info msg="StartContainer for \"6f6352c37aac5f790cd9d197f62f41518f32d921110f26e3d0b00dae1dee3c0b\" returns successfully" May 17 00:48:25.244113 kubelet[2109]: I0517 00:48:25.243966 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-pqk52" podStartSLOduration=4.243948647 podStartE2EDuration="4.243948647s" podCreationTimestamp="2025-05-17 00:48:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:23.233905567 +0000 UTC m=+7.244392377" watchObservedRunningTime="2025-05-17 00:48:25.243948647 +0000 UTC m=+9.254435454" May 17 00:48:25.244113 kubelet[2109]: I0517 00:48:25.244049 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-5cnbc" podStartSLOduration=1.06052059 podStartE2EDuration="3.244044367s" podCreationTimestamp="2025-05-17 00:48:22 +0000 UTC" firstStartedPulling="2025-05-17 00:48:22.46570433 +0000 UTC m=+6.476191132" lastFinishedPulling="2025-05-17 00:48:24.649228103 +0000 UTC m=+8.659714909" observedRunningTime="2025-05-17 00:48:25.243824113 +0000 UTC m=+9.254310916" watchObservedRunningTime="2025-05-17 00:48:25.244044367 +0000 UTC m=+9.254531178" May 17 00:48:31.261606 sudo[1473]: pam_unix(sudo:session): session closed for user root May 17 00:48:31.268727 kernel: kauditd_printk_skb: 357 callbacks suppressed May 17 00:48:31.268808 kernel: audit: type=1106 audit(1747442911.260:933): pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:31.260000 audit[1473]: USER_END pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:31.271878 kernel: audit: type=1104 audit(1747442911.260:934): pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:31.260000 audit[1473]: CRED_DISP pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:48:31.302228 sshd[1469]: pam_unix(sshd:session): session closed for user core May 17 00:48:31.304000 audit[1469]: USER_END pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:31.314091 kernel: audit: type=1106 audit(1747442911.304:935): pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:31.314180 kernel: audit: type=1104 audit(1747442911.304:936): pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:31.304000 audit[1469]: CRED_DISP pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:48:31.319169 systemd[1]: sshd@6-139.178.70.107:22-147.75.109.163:54034.service: Deactivated successfully. May 17 00:48:31.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:31.320143 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:48:31.320242 systemd[1]: session-9.scope: Consumed 3.191s CPU time. May 17 00:48:31.320602 systemd-logind[1240]: Session 9 logged out. Waiting for processes to exit. May 17 00:48:31.323483 kernel: audit: type=1131 audit(1747442911.317:937): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:54034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:31.321223 systemd-logind[1240]: Removed session 9. May 17 00:48:31.528570 kernel: audit: type=1325 audit(1747442911.520:938): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:31.528661 kernel: audit: type=1300 audit(1747442911.520:938): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffeb686650 a2=0 a3=7fffeb68663c items=0 ppid=2248 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:31.520000 audit[2484]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:31.520000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffeb686650 a2=0 a3=7fffeb68663c items=0 ppid=2248 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:31.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:31.531373 kernel: audit: type=1327 audit(1747442911.520:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:31.529000 audit[2484]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:31.536385 kernel: audit: type=1325 audit(1747442911.529:939): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:31.540401 kernel: audit: type=1300 audit(1747442911.529:939): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffeb686650 a2=0 a3=0 items=0 ppid=2248 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:31.529000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffeb686650 a2=0 a3=0 items=0 ppid=2248 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:31.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:31.544000 audit[2486]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:31.544000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd7da18a30 a2=0 a3=7ffd7da18a1c items=0 ppid=2248 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:31.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:31.548000 audit[2486]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:31.548000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd7da18a30 a2=0 a3=0 items=0 ppid=2248 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:31.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:33.346000 audit[2488]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:33.346000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff8937a7c0 a2=0 a3=7fff8937a7ac items=0 ppid=2248 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:33.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:33.352000 audit[2488]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:33.352000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8937a7c0 a2=0 a3=0 items=0 ppid=2248 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:33.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:33.552000 audit[2490]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:33.552000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdf6e1cbc0 a2=0 a3=7ffdf6e1cbac items=0 ppid=2248 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:33.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:33.556000 audit[2490]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:33.556000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf6e1cbc0 a2=0 a3=0 items=0 ppid=2248 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:33.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:33.662894 systemd[1]: Created slice kubepods-besteffort-pode8d515b5_1f90_4958_9b60_b44967909d27.slice. May 17 00:48:33.681715 kubelet[2109]: I0517 00:48:33.681684 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gmpkg\" (UniqueName: \"kubernetes.io/projected/e8d515b5-1f90-4958-9b60-b44967909d27-kube-api-access-gmpkg\") pod \"calico-typha-766749556f-57pt2\" (UID: \"e8d515b5-1f90-4958-9b60-b44967909d27\") " pod="calico-system/calico-typha-766749556f-57pt2" May 17 00:48:33.682081 kubelet[2109]: I0517 00:48:33.682065 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e8d515b5-1f90-4958-9b60-b44967909d27-typha-certs\") pod \"calico-typha-766749556f-57pt2\" (UID: \"e8d515b5-1f90-4958-9b60-b44967909d27\") " pod="calico-system/calico-typha-766749556f-57pt2" May 17 00:48:33.682159 kubelet[2109]: I0517 00:48:33.682147 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e8d515b5-1f90-4958-9b60-b44967909d27-tigera-ca-bundle\") pod \"calico-typha-766749556f-57pt2\" (UID: \"e8d515b5-1f90-4958-9b60-b44967909d27\") " pod="calico-system/calico-typha-766749556f-57pt2" May 17 00:48:33.998776 env[1249]: time="2025-05-17T00:48:33.998696549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-766749556f-57pt2,Uid:e8d515b5-1f90-4958-9b60-b44967909d27,Namespace:calico-system,Attempt:0,}" May 17 00:48:34.032624 systemd[1]: Created slice kubepods-besteffort-pod23499bb4_c3ca_4519_acf6_96354b556711.slice. May 17 00:48:34.043267 env[1249]: time="2025-05-17T00:48:34.043199385Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:34.043446 env[1249]: time="2025-05-17T00:48:34.043423068Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:34.043561 env[1249]: time="2025-05-17T00:48:34.043534533Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:34.043821 env[1249]: time="2025-05-17T00:48:34.043786083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f66e87739004f84dcbad5ff0026d511b0597f5715dbea7a916bc4fa35eaea70b pid=2499 runtime=io.containerd.runc.v2 May 17 00:48:34.060713 systemd[1]: Started cri-containerd-f66e87739004f84dcbad5ff0026d511b0597f5715dbea7a916bc4fa35eaea70b.scope. May 17 00:48:34.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit: BPF prog-id=121 op=LOAD May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2499 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366538373733393030346638346463626164356666303032366435 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2499 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366538373733393030346638346463626164356666303032366435 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit: BPF prog-id=122 op=LOAD May 17 00:48:34.076000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ca6a0 items=0 ppid=2499 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366538373733393030346638346463626164356666303032366435 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.076000 audit: BPF prog-id=123 op=LOAD May 17 00:48:34.076000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ca6e8 items=0 ppid=2499 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366538373733393030346638346463626164356666303032366435 May 17 00:48:34.076000 audit: BPF prog-id=123 op=UNLOAD May 17 00:48:34.076000 audit: BPF prog-id=122 op=UNLOAD May 17 00:48:34.077000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.077000 audit: BPF prog-id=124 op=LOAD May 17 00:48:34.077000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001caaf8 items=0 ppid=2499 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366538373733393030346638346463626164356666303032366435 May 17 00:48:34.084289 kubelet[2109]: I0517 00:48:34.084247 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-lib-modules\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084289 kubelet[2109]: I0517 00:48:34.084288 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/23499bb4-c3ca-4519-acf6-96354b556711-node-certs\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084460 kubelet[2109]: I0517 00:48:34.084306 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-policysync\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084460 kubelet[2109]: I0517 00:48:34.084320 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-var-lib-calico\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084460 kubelet[2109]: I0517 00:48:34.084337 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-cni-bin-dir\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084460 kubelet[2109]: I0517 00:48:34.084398 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/23499bb4-c3ca-4519-acf6-96354b556711-tigera-ca-bundle\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084460 kubelet[2109]: I0517 00:48:34.084417 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-var-run-calico\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084588 kubelet[2109]: I0517 00:48:34.084431 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-flexvol-driver-host\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084588 kubelet[2109]: I0517 00:48:34.084450 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-btq4t\" (UniqueName: \"kubernetes.io/projected/23499bb4-c3ca-4519-acf6-96354b556711-kube-api-access-btq4t\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084588 kubelet[2109]: I0517 00:48:34.084466 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-cni-net-dir\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084588 kubelet[2109]: I0517 00:48:34.084480 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-xtables-lock\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.084588 kubelet[2109]: I0517 00:48:34.084499 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/23499bb4-c3ca-4519-acf6-96354b556711-cni-log-dir\") pod \"calico-node-dqq57\" (UID: \"23499bb4-c3ca-4519-acf6-96354b556711\") " pod="calico-system/calico-node-dqq57" May 17 00:48:34.109497 env[1249]: time="2025-05-17T00:48:34.109473339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-766749556f-57pt2,Uid:e8d515b5-1f90-4958-9b60-b44967909d27,Namespace:calico-system,Attempt:0,} returns sandbox id \"f66e87739004f84dcbad5ff0026d511b0597f5715dbea7a916bc4fa35eaea70b\"" May 17 00:48:34.110571 env[1249]: time="2025-05-17T00:48:34.110556282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:48:34.260302 kubelet[2109]: E0517 00:48:34.260200 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:34.263533 kubelet[2109]: I0517 00:48:34.263489 2109 status_manager.go:890] "Failed to get status for pod" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" pod="calico-system/csi-node-driver-xpczn" err="pods \"csi-node-driver-xpczn\" is forbidden: User \"system:node:localhost\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'localhost' and this object" May 17 00:48:34.266193 kubelet[2109]: E0517 00:48:34.266162 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.266193 kubelet[2109]: W0517 00:48:34.266188 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.266373 kubelet[2109]: E0517 00:48:34.266214 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.266551 kubelet[2109]: E0517 00:48:34.266538 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.266551 kubelet[2109]: W0517 00:48:34.266549 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.266622 kubelet[2109]: E0517 00:48:34.266563 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.266740 kubelet[2109]: E0517 00:48:34.266728 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.266740 kubelet[2109]: W0517 00:48:34.266737 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.266863 kubelet[2109]: E0517 00:48:34.266745 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.268298 kubelet[2109]: E0517 00:48:34.268275 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.268298 kubelet[2109]: W0517 00:48:34.268292 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.268433 kubelet[2109]: E0517 00:48:34.268308 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.268552 kubelet[2109]: E0517 00:48:34.268539 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.268552 kubelet[2109]: W0517 00:48:34.268548 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.268621 kubelet[2109]: E0517 00:48:34.268557 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.268975 kubelet[2109]: E0517 00:48:34.268958 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.269021 kubelet[2109]: W0517 00:48:34.268969 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.269021 kubelet[2109]: E0517 00:48:34.268999 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.269254 kubelet[2109]: E0517 00:48:34.269240 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.269254 kubelet[2109]: W0517 00:48:34.269251 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.269337 kubelet[2109]: E0517 00:48:34.269259 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.270472 kubelet[2109]: E0517 00:48:34.270436 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.270472 kubelet[2109]: W0517 00:48:34.270454 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.270472 kubelet[2109]: E0517 00:48:34.270476 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.270735 kubelet[2109]: E0517 00:48:34.270716 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.270735 kubelet[2109]: W0517 00:48:34.270724 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.270735 kubelet[2109]: E0517 00:48:34.270733 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.270947 kubelet[2109]: E0517 00:48:34.270934 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.270947 kubelet[2109]: W0517 00:48:34.270944 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.271024 kubelet[2109]: E0517 00:48:34.270954 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.271326 kubelet[2109]: E0517 00:48:34.271290 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.271326 kubelet[2109]: W0517 00:48:34.271302 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.271326 kubelet[2109]: E0517 00:48:34.271308 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.271512 kubelet[2109]: E0517 00:48:34.271498 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.271512 kubelet[2109]: W0517 00:48:34.271508 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.271585 kubelet[2109]: E0517 00:48:34.271516 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.271700 kubelet[2109]: E0517 00:48:34.271688 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.271700 kubelet[2109]: W0517 00:48:34.271697 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.271756 kubelet[2109]: E0517 00:48:34.271706 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.271868 kubelet[2109]: E0517 00:48:34.271854 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.271868 kubelet[2109]: W0517 00:48:34.271864 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.271945 kubelet[2109]: E0517 00:48:34.271873 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.272119 kubelet[2109]: E0517 00:48:34.272106 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.272119 kubelet[2109]: W0517 00:48:34.272116 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.272119 kubelet[2109]: E0517 00:48:34.272125 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.272739 kubelet[2109]: E0517 00:48:34.272723 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.272739 kubelet[2109]: W0517 00:48:34.272735 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.272820 kubelet[2109]: E0517 00:48:34.272757 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.273331 kubelet[2109]: E0517 00:48:34.273315 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.273331 kubelet[2109]: W0517 00:48:34.273323 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.273331 kubelet[2109]: E0517 00:48:34.273332 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.273532 kubelet[2109]: E0517 00:48:34.273522 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.273532 kubelet[2109]: W0517 00:48:34.273529 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.273600 kubelet[2109]: E0517 00:48:34.273534 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.273698 kubelet[2109]: E0517 00:48:34.273688 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.273698 kubelet[2109]: W0517 00:48:34.273695 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.273767 kubelet[2109]: E0517 00:48:34.273702 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.273888 kubelet[2109]: E0517 00:48:34.273876 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.273888 kubelet[2109]: W0517 00:48:34.273884 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.273960 kubelet[2109]: E0517 00:48:34.273891 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.286276 kubelet[2109]: E0517 00:48:34.286250 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.286276 kubelet[2109]: W0517 00:48:34.286268 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.286276 kubelet[2109]: E0517 00:48:34.286282 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.286446 kubelet[2109]: I0517 00:48:34.286304 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cd10f665-ce0e-4c29-b06e-afa77ff31d8a-socket-dir\") pod \"csi-node-driver-xpczn\" (UID: \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\") " pod="calico-system/csi-node-driver-xpczn" May 17 00:48:34.286600 kubelet[2109]: E0517 00:48:34.286588 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.286600 kubelet[2109]: W0517 00:48:34.286597 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.286661 kubelet[2109]: E0517 00:48:34.286606 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.286661 kubelet[2109]: I0517 00:48:34.286623 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cd10f665-ce0e-4c29-b06e-afa77ff31d8a-varrun\") pod \"csi-node-driver-xpczn\" (UID: \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\") " pod="calico-system/csi-node-driver-xpczn" May 17 00:48:34.286781 kubelet[2109]: E0517 00:48:34.286770 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.286781 kubelet[2109]: W0517 00:48:34.286778 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.286868 kubelet[2109]: E0517 00:48:34.286785 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.286868 kubelet[2109]: I0517 00:48:34.286794 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n95js\" (UniqueName: \"kubernetes.io/projected/cd10f665-ce0e-4c29-b06e-afa77ff31d8a-kube-api-access-n95js\") pod \"csi-node-driver-xpczn\" (UID: \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\") " pod="calico-system/csi-node-driver-xpczn" May 17 00:48:34.286926 kubelet[2109]: E0517 00:48:34.286915 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.286926 kubelet[2109]: W0517 00:48:34.286922 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.286926 kubelet[2109]: E0517 00:48:34.286928 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.287004 kubelet[2109]: I0517 00:48:34.286936 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cd10f665-ce0e-4c29-b06e-afa77ff31d8a-kubelet-dir\") pod \"csi-node-driver-xpczn\" (UID: \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\") " pod="calico-system/csi-node-driver-xpczn" May 17 00:48:34.287029 kubelet[2109]: E0517 00:48:34.287025 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.287049 kubelet[2109]: W0517 00:48:34.287030 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.287049 kubelet[2109]: E0517 00:48:34.287041 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.287097 kubelet[2109]: I0517 00:48:34.287049 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cd10f665-ce0e-4c29-b06e-afa77ff31d8a-registration-dir\") pod \"csi-node-driver-xpczn\" (UID: \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\") " pod="calico-system/csi-node-driver-xpczn" May 17 00:48:34.287150 kubelet[2109]: E0517 00:48:34.287139 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.287150 kubelet[2109]: W0517 00:48:34.287146 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.287224 kubelet[2109]: E0517 00:48:34.287157 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.287340 kubelet[2109]: E0517 00:48:34.287329 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.287340 kubelet[2109]: W0517 00:48:34.287336 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.287436 kubelet[2109]: E0517 00:48:34.287345 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.287538 kubelet[2109]: E0517 00:48:34.287528 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.287538 kubelet[2109]: W0517 00:48:34.287535 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.287615 kubelet[2109]: E0517 00:48:34.287544 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.287768 kubelet[2109]: E0517 00:48:34.287756 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.287768 kubelet[2109]: W0517 00:48:34.287763 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.287843 kubelet[2109]: E0517 00:48:34.287773 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.287958 kubelet[2109]: E0517 00:48:34.287947 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.287958 kubelet[2109]: W0517 00:48:34.287954 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.288029 kubelet[2109]: E0517 00:48:34.287962 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.288134 kubelet[2109]: E0517 00:48:34.288124 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.288134 kubelet[2109]: W0517 00:48:34.288130 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.288262 kubelet[2109]: E0517 00:48:34.288207 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.288302 kubelet[2109]: E0517 00:48:34.288285 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.288302 kubelet[2109]: W0517 00:48:34.288290 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.288355 kubelet[2109]: E0517 00:48:34.288327 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.288593 kubelet[2109]: E0517 00:48:34.288582 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.288593 kubelet[2109]: W0517 00:48:34.288590 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.288658 kubelet[2109]: E0517 00:48:34.288600 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.288762 kubelet[2109]: E0517 00:48:34.288753 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.288762 kubelet[2109]: W0517 00:48:34.288759 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.288835 kubelet[2109]: E0517 00:48:34.288764 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.288946 kubelet[2109]: E0517 00:48:34.288937 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.288946 kubelet[2109]: W0517 00:48:34.288943 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.289007 kubelet[2109]: E0517 00:48:34.288948 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.347705 env[1249]: time="2025-05-17T00:48:34.347531961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dqq57,Uid:23499bb4-c3ca-4519-acf6-96354b556711,Namespace:calico-system,Attempt:0,}" May 17 00:48:34.387593 kubelet[2109]: E0517 00:48:34.387349 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.387593 kubelet[2109]: W0517 00:48:34.387371 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.387593 kubelet[2109]: E0517 00:48:34.387386 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.387593 kubelet[2109]: E0517 00:48:34.387509 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.387593 kubelet[2109]: W0517 00:48:34.387514 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.387593 kubelet[2109]: E0517 00:48:34.387527 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.387966 kubelet[2109]: E0517 00:48:34.387881 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.387966 kubelet[2109]: W0517 00:48:34.387888 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.387966 kubelet[2109]: E0517 00:48:34.387899 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388168 kubelet[2109]: E0517 00:48:34.388092 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388168 kubelet[2109]: W0517 00:48:34.388098 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388168 kubelet[2109]: E0517 00:48:34.388106 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388317 kubelet[2109]: E0517 00:48:34.388279 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388317 kubelet[2109]: W0517 00:48:34.388285 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388317 kubelet[2109]: E0517 00:48:34.388294 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388408 kubelet[2109]: E0517 00:48:34.388398 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388408 kubelet[2109]: W0517 00:48:34.388405 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388455 kubelet[2109]: E0517 00:48:34.388415 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388509 kubelet[2109]: E0517 00:48:34.388495 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388509 kubelet[2109]: W0517 00:48:34.388501 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388574 kubelet[2109]: E0517 00:48:34.388509 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388597 kubelet[2109]: E0517 00:48:34.388584 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388597 kubelet[2109]: W0517 00:48:34.388589 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388597 kubelet[2109]: E0517 00:48:34.388594 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388702 kubelet[2109]: E0517 00:48:34.388692 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388702 kubelet[2109]: W0517 00:48:34.388699 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388759 kubelet[2109]: E0517 00:48:34.388706 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388794 kubelet[2109]: E0517 00:48:34.388785 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388794 kubelet[2109]: W0517 00:48:34.388792 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388853 kubelet[2109]: E0517 00:48:34.388799 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388883 kubelet[2109]: E0517 00:48:34.388867 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388883 kubelet[2109]: W0517 00:48:34.388871 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.388883 kubelet[2109]: E0517 00:48:34.388876 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.388953 kubelet[2109]: E0517 00:48:34.388941 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.388953 kubelet[2109]: W0517 00:48:34.388948 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389011 kubelet[2109]: E0517 00:48:34.388953 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389082 kubelet[2109]: E0517 00:48:34.389041 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389082 kubelet[2109]: W0517 00:48:34.389048 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389082 kubelet[2109]: E0517 00:48:34.389061 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389169 kubelet[2109]: E0517 00:48:34.389117 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389169 kubelet[2109]: W0517 00:48:34.389122 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389209 kubelet[2109]: E0517 00:48:34.389187 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389209 kubelet[2109]: W0517 00:48:34.389191 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389209 kubelet[2109]: E0517 00:48:34.389196 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389264 kubelet[2109]: E0517 00:48:34.389259 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389264 kubelet[2109]: W0517 00:48:34.389263 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389303 kubelet[2109]: E0517 00:48:34.389267 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389405 kubelet[2109]: E0517 00:48:34.389330 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389405 kubelet[2109]: E0517 00:48:34.389333 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389405 kubelet[2109]: W0517 00:48:34.389347 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389405 kubelet[2109]: E0517 00:48:34.389373 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389585 kubelet[2109]: E0517 00:48:34.389527 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389585 kubelet[2109]: W0517 00:48:34.389533 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389585 kubelet[2109]: E0517 00:48:34.389549 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389753 kubelet[2109]: E0517 00:48:34.389687 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389753 kubelet[2109]: W0517 00:48:34.389693 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389753 kubelet[2109]: E0517 00:48:34.389703 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.389983 kubelet[2109]: E0517 00:48:34.389861 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.389983 kubelet[2109]: W0517 00:48:34.389867 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.389983 kubelet[2109]: E0517 00:48:34.389875 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.390160 kubelet[2109]: E0517 00:48:34.390090 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.390160 kubelet[2109]: W0517 00:48:34.390096 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.390160 kubelet[2109]: E0517 00:48:34.390104 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.390310 kubelet[2109]: E0517 00:48:34.390259 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.390310 kubelet[2109]: W0517 00:48:34.390265 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.390310 kubelet[2109]: E0517 00:48:34.390270 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.390722 kubelet[2109]: E0517 00:48:34.390396 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.390722 kubelet[2109]: W0517 00:48:34.390401 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.390722 kubelet[2109]: E0517 00:48:34.390406 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.390722 kubelet[2109]: E0517 00:48:34.390520 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.390722 kubelet[2109]: W0517 00:48:34.390524 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.390722 kubelet[2109]: E0517 00:48:34.390529 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.393241 kubelet[2109]: E0517 00:48:34.393188 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.393241 kubelet[2109]: W0517 00:48:34.393200 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.393241 kubelet[2109]: E0517 00:48:34.393211 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.403253 kubelet[2109]: E0517 00:48:34.403200 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:34.403253 kubelet[2109]: W0517 00:48:34.403213 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:34.403253 kubelet[2109]: E0517 00:48:34.403225 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:34.415084 env[1249]: time="2025-05-17T00:48:34.414773375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:34.415084 env[1249]: time="2025-05-17T00:48:34.414848107Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:34.415084 env[1249]: time="2025-05-17T00:48:34.414860607Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:34.415269 env[1249]: time="2025-05-17T00:48:34.415060548Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9 pid=2604 runtime=io.containerd.runc.v2 May 17 00:48:34.440876 systemd[1]: Started cri-containerd-db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9.scope. May 17 00:48:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit: BPF prog-id=125 op=LOAD May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2604 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336663316562393833323664343334663936623764343833343130 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2604 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336663316562393833323664343334663936623764343833343130 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit: BPF prog-id=126 op=LOAD May 17 00:48:34.456000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003b4ad0 items=0 ppid=2604 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336663316562393833323664343334663936623764343833343130 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit: BPF prog-id=127 op=LOAD May 17 00:48:34.456000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003b4b18 items=0 ppid=2604 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336663316562393833323664343334663936623764343833343130 May 17 00:48:34.456000 audit: BPF prog-id=127 op=UNLOAD May 17 00:48:34.456000 audit: BPF prog-id=126 op=UNLOAD May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:34.456000 audit: BPF prog-id=128 op=LOAD May 17 00:48:34.456000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b4f28 items=0 ppid=2604 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336663316562393833323664343334663936623764343833343130 May 17 00:48:34.468215 env[1249]: time="2025-05-17T00:48:34.468191273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dqq57,Uid:23499bb4-c3ca-4519-acf6-96354b556711,Namespace:calico-system,Attempt:0,} returns sandbox id \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\"" May 17 00:48:34.563000 audit[2646]: NETFILTER_CFG table=filter:97 family=2 entries=22 op=nft_register_rule pid=2646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:34.563000 audit[2646]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe87807e60 a2=0 a3=7ffe87807e4c items=0 ppid=2248 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:34.570000 audit[2646]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:34.570000 audit[2646]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe87807e60 a2=0 a3=0 items=0 ppid=2248 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:34.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:35.790843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount214079194.mount: Deactivated successfully. May 17 00:48:36.193154 kubelet[2109]: E0517 00:48:36.193079 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:36.833856 env[1249]: time="2025-05-17T00:48:36.833826167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:36.854670 env[1249]: time="2025-05-17T00:48:36.854634644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:36.859137 env[1249]: time="2025-05-17T00:48:36.859119962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:36.867064 env[1249]: time="2025-05-17T00:48:36.867040147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:36.867550 env[1249]: time="2025-05-17T00:48:36.867526973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:48:36.870389 env[1249]: time="2025-05-17T00:48:36.868971716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:48:36.883997 env[1249]: time="2025-05-17T00:48:36.883959023Z" level=info msg="CreateContainer within sandbox \"f66e87739004f84dcbad5ff0026d511b0597f5715dbea7a916bc4fa35eaea70b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:48:36.898957 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2865645171.mount: Deactivated successfully. May 17 00:48:36.905970 env[1249]: time="2025-05-17T00:48:36.905909945Z" level=info msg="CreateContainer within sandbox \"f66e87739004f84dcbad5ff0026d511b0597f5715dbea7a916bc4fa35eaea70b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f102ac877f63142eb80bca5f82ecb3c45bcfda3a01a1bb2c87fc695dd7d79bb7\"" May 17 00:48:36.906433 env[1249]: time="2025-05-17T00:48:36.906405034Z" level=info msg="StartContainer for \"f102ac877f63142eb80bca5f82ecb3c45bcfda3a01a1bb2c87fc695dd7d79bb7\"" May 17 00:48:36.924118 systemd[1]: Started cri-containerd-f102ac877f63142eb80bca5f82ecb3c45bcfda3a01a1bb2c87fc695dd7d79bb7.scope. May 17 00:48:36.941851 kernel: kauditd_printk_skb: 139 callbacks suppressed May 17 00:48:36.941923 kernel: audit: type=1400 audit(1747442916.937:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.941943 kernel: audit: type=1400 audit(1747442916.937:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.944146 kernel: audit: type=1400 audit(1747442916.937:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.954173 kernel: audit: type=1400 audit(1747442916.937:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.954207 kernel: audit: type=1400 audit(1747442916.937:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.959385 kernel: audit: type=1400 audit(1747442916.937:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.968131 kernel: audit: type=1400 audit(1747442916.937:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.968155 kernel: audit: type=1400 audit(1747442916.937:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.968176 kernel: audit: type=1400 audit(1747442916.937:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit: BPF prog-id=129 op=LOAD May 17 00:48:36.940000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2499 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261633837376636333134326562383062636135663832656362 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2499 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261633837376636333134326562383062636135663832656362 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.940000 audit: BPF prog-id=130 op=LOAD May 17 00:48:36.940000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e1d10 items=0 ppid=2499 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261633837376636333134326562383062636135663832656362 May 17 00:48:36.978386 kernel: audit: type=1400 audit(1747442916.940:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit: BPF prog-id=131 op=LOAD May 17 00:48:36.945000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000e1d58 items=0 ppid=2499 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261633837376636333134326562383062636135663832656362 May 17 00:48:36.945000 audit: BPF prog-id=131 op=UNLOAD May 17 00:48:36.945000 audit: BPF prog-id=130 op=UNLOAD May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:36.945000 audit: BPF prog-id=132 op=LOAD May 17 00:48:36.945000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000368168 items=0 ppid=2499 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:36.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261633837376636333134326562383062636135663832656362 May 17 00:48:37.026983 env[1249]: time="2025-05-17T00:48:37.026947892Z" level=info msg="StartContainer for \"f102ac877f63142eb80bca5f82ecb3c45bcfda3a01a1bb2c87fc695dd7d79bb7\" returns successfully" May 17 00:48:37.292099 kubelet[2109]: E0517 00:48:37.292071 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.292099 kubelet[2109]: W0517 00:48:37.292094 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.292418 kubelet[2109]: E0517 00:48:37.292114 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.292496 kubelet[2109]: E0517 00:48:37.292454 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.292496 kubelet[2109]: W0517 00:48:37.292464 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.292496 kubelet[2109]: E0517 00:48:37.292472 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.293197 kubelet[2109]: E0517 00:48:37.293182 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.293242 kubelet[2109]: W0517 00:48:37.293198 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.293242 kubelet[2109]: E0517 00:48:37.293208 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.293458 kubelet[2109]: E0517 00:48:37.293429 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.293458 kubelet[2109]: W0517 00:48:37.293441 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.293458 kubelet[2109]: E0517 00:48:37.293449 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.293730 kubelet[2109]: E0517 00:48:37.293707 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.293730 kubelet[2109]: W0517 00:48:37.293718 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.293730 kubelet[2109]: E0517 00:48:37.293726 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.293968 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.297826 kubelet[2109]: W0517 00:48:37.293985 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.294000 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.294170 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.297826 kubelet[2109]: W0517 00:48:37.294177 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.294184 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.294323 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.297826 kubelet[2109]: W0517 00:48:37.294330 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.294337 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.297826 kubelet[2109]: E0517 00:48:37.294473 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298154 kubelet[2109]: W0517 00:48:37.294479 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298154 kubelet[2109]: E0517 00:48:37.294488 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.298154 kubelet[2109]: E0517 00:48:37.294619 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298154 kubelet[2109]: W0517 00:48:37.294627 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298154 kubelet[2109]: E0517 00:48:37.294633 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.298154 kubelet[2109]: E0517 00:48:37.294737 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298154 kubelet[2109]: W0517 00:48:37.294745 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298154 kubelet[2109]: E0517 00:48:37.294755 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.298403 kubelet[2109]: I0517 00:48:37.295129 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-766749556f-57pt2" podStartSLOduration=1.536992165 podStartE2EDuration="4.295119037s" podCreationTimestamp="2025-05-17 00:48:33 +0000 UTC" firstStartedPulling="2025-05-17 00:48:34.110351928 +0000 UTC m=+18.120838728" lastFinishedPulling="2025-05-17 00:48:36.868478799 +0000 UTC m=+20.878965600" observedRunningTime="2025-05-17 00:48:37.275039659 +0000 UTC m=+21.285526469" watchObservedRunningTime="2025-05-17 00:48:37.295119037 +0000 UTC m=+21.305605847" May 17 00:48:37.298403 kubelet[2109]: E0517 00:48:37.295575 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298403 kubelet[2109]: W0517 00:48:37.295583 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298403 kubelet[2109]: E0517 00:48:37.295597 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.298403 kubelet[2109]: E0517 00:48:37.295735 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298403 kubelet[2109]: W0517 00:48:37.295743 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298403 kubelet[2109]: E0517 00:48:37.295754 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.298403 kubelet[2109]: E0517 00:48:37.295865 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298645 kubelet[2109]: W0517 00:48:37.295872 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298645 kubelet[2109]: E0517 00:48:37.295890 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.298645 kubelet[2109]: E0517 00:48:37.296007 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.298645 kubelet[2109]: W0517 00:48:37.296013 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.298645 kubelet[2109]: E0517 00:48:37.296019 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.309454 kubelet[2109]: E0517 00:48:37.309431 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.309454 kubelet[2109]: W0517 00:48:37.309449 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.309585 kubelet[2109]: E0517 00:48:37.309465 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.309793 kubelet[2109]: E0517 00:48:37.309774 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.309793 kubelet[2109]: W0517 00:48:37.309783 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.309870 kubelet[2109]: E0517 00:48:37.309794 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.309986 kubelet[2109]: E0517 00:48:37.309974 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.309986 kubelet[2109]: W0517 00:48:37.309981 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.309986 kubelet[2109]: E0517 00:48:37.309989 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.310413 kubelet[2109]: E0517 00:48:37.310400 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.310413 kubelet[2109]: W0517 00:48:37.310410 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310422 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310652 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.311086 kubelet[2109]: W0517 00:48:37.310659 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310671 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310774 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.311086 kubelet[2109]: W0517 00:48:37.310780 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310798 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310898 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.311086 kubelet[2109]: W0517 00:48:37.310905 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311086 kubelet[2109]: E0517 00:48:37.310924 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.311336 kubelet[2109]: E0517 00:48:37.311031 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.311336 kubelet[2109]: W0517 00:48:37.311038 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311336 kubelet[2109]: E0517 00:48:37.311049 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.311489 kubelet[2109]: E0517 00:48:37.311478 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.311489 kubelet[2109]: W0517 00:48:37.311487 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311567 kubelet[2109]: E0517 00:48:37.311498 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.311682 kubelet[2109]: E0517 00:48:37.311662 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.311682 kubelet[2109]: W0517 00:48:37.311671 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.311682 kubelet[2109]: E0517 00:48:37.311681 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.312192 kubelet[2109]: E0517 00:48:37.311823 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.312192 kubelet[2109]: W0517 00:48:37.311832 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.312192 kubelet[2109]: E0517 00:48:37.311841 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.312192 kubelet[2109]: E0517 00:48:37.312032 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.312192 kubelet[2109]: W0517 00:48:37.312041 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.312192 kubelet[2109]: E0517 00:48:37.312049 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.312574 kubelet[2109]: E0517 00:48:37.312399 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.312574 kubelet[2109]: W0517 00:48:37.312408 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.312574 kubelet[2109]: E0517 00:48:37.312421 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.312574 kubelet[2109]: E0517 00:48:37.312536 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.312574 kubelet[2109]: W0517 00:48:37.312543 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.312574 kubelet[2109]: E0517 00:48:37.312553 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.312802 kubelet[2109]: E0517 00:48:37.312789 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.312802 kubelet[2109]: W0517 00:48:37.312799 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.312869 kubelet[2109]: E0517 00:48:37.312808 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.312967 kubelet[2109]: E0517 00:48:37.312956 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.312967 kubelet[2109]: W0517 00:48:37.312964 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.313030 kubelet[2109]: E0517 00:48:37.312972 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.313145 kubelet[2109]: E0517 00:48:37.313127 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.313145 kubelet[2109]: W0517 00:48:37.313136 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.313145 kubelet[2109]: E0517 00:48:37.313143 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.313436 kubelet[2109]: E0517 00:48:37.313424 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:37.313436 kubelet[2109]: W0517 00:48:37.313431 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:37.313518 kubelet[2109]: E0517 00:48:37.313438 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:37.323000 audit[2722]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:37.323000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe1eeafe20 a2=0 a3=7ffe1eeafe0c items=0 ppid=2248 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:37.328000 audit[2722]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:37.328000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe1eeafe20 a2=0 a3=7ffe1eeafe0c items=0 ppid=2248 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:37.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:38.197293 kubelet[2109]: E0517 00:48:38.197272 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:38.301985 kubelet[2109]: E0517 00:48:38.301966 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.302222 kubelet[2109]: W0517 00:48:38.302209 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.302277 kubelet[2109]: E0517 00:48:38.302268 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.302459 kubelet[2109]: E0517 00:48:38.302451 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.302513 kubelet[2109]: W0517 00:48:38.302504 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.302568 kubelet[2109]: E0517 00:48:38.302559 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.302715 kubelet[2109]: E0517 00:48:38.302708 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.302765 kubelet[2109]: W0517 00:48:38.302756 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.302812 kubelet[2109]: E0517 00:48:38.302804 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.302999 kubelet[2109]: E0517 00:48:38.302992 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.303079 kubelet[2109]: W0517 00:48:38.303071 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.303130 kubelet[2109]: E0517 00:48:38.303122 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.303310 kubelet[2109]: E0517 00:48:38.303302 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.303383 kubelet[2109]: W0517 00:48:38.303372 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.303446 kubelet[2109]: E0517 00:48:38.303437 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.303598 kubelet[2109]: E0517 00:48:38.303590 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.303648 kubelet[2109]: W0517 00:48:38.303640 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.303697 kubelet[2109]: E0517 00:48:38.303689 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.303840 kubelet[2109]: E0517 00:48:38.303834 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.303883 kubelet[2109]: W0517 00:48:38.303875 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.303930 kubelet[2109]: E0517 00:48:38.303922 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.304087 kubelet[2109]: E0517 00:48:38.304078 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.304147 kubelet[2109]: W0517 00:48:38.304137 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.304198 kubelet[2109]: E0517 00:48:38.304189 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.304346 kubelet[2109]: E0517 00:48:38.304338 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.304418 kubelet[2109]: W0517 00:48:38.304410 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.304466 kubelet[2109]: E0517 00:48:38.304458 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.304621 kubelet[2109]: E0517 00:48:38.304615 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.304669 kubelet[2109]: W0517 00:48:38.304661 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.304715 kubelet[2109]: E0517 00:48:38.304708 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.304927 kubelet[2109]: E0517 00:48:38.304920 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.305069 kubelet[2109]: W0517 00:48:38.304977 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.305147 kubelet[2109]: E0517 00:48:38.305131 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.305316 kubelet[2109]: E0517 00:48:38.305309 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.305380 kubelet[2109]: W0517 00:48:38.305371 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.305436 kubelet[2109]: E0517 00:48:38.305426 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.305603 kubelet[2109]: E0517 00:48:38.305595 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.305652 kubelet[2109]: W0517 00:48:38.305643 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.305699 kubelet[2109]: E0517 00:48:38.305689 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.305891 kubelet[2109]: E0517 00:48:38.305884 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.305947 kubelet[2109]: W0517 00:48:38.305928 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.305992 kubelet[2109]: E0517 00:48:38.305984 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.306193 kubelet[2109]: E0517 00:48:38.306184 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.306256 kubelet[2109]: W0517 00:48:38.306246 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.306313 kubelet[2109]: E0517 00:48:38.306305 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.315204 kubelet[2109]: E0517 00:48:38.315184 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.315349 kubelet[2109]: W0517 00:48:38.315337 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.315419 kubelet[2109]: E0517 00:48:38.315410 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.315596 kubelet[2109]: E0517 00:48:38.315589 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.315643 kubelet[2109]: W0517 00:48:38.315635 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.315692 kubelet[2109]: E0517 00:48:38.315684 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.315849 kubelet[2109]: E0517 00:48:38.315837 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.315897 kubelet[2109]: W0517 00:48:38.315889 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.315941 kubelet[2109]: E0517 00:48:38.315934 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.316103 kubelet[2109]: E0517 00:48:38.316097 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.316332 kubelet[2109]: W0517 00:48:38.316178 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.316332 kubelet[2109]: E0517 00:48:38.316192 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.316436 kubelet[2109]: E0517 00:48:38.316429 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.316482 kubelet[2109]: W0517 00:48:38.316474 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.316544 kubelet[2109]: E0517 00:48:38.316523 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.316690 kubelet[2109]: E0517 00:48:38.316684 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.316751 kubelet[2109]: W0517 00:48:38.316743 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.316798 kubelet[2109]: E0517 00:48:38.316790 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.316986 kubelet[2109]: E0517 00:48:38.316980 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.317032 kubelet[2109]: W0517 00:48:38.317024 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.317096 kubelet[2109]: E0517 00:48:38.317088 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.317224 kubelet[2109]: E0517 00:48:38.317213 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.317257 kubelet[2109]: W0517 00:48:38.317223 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.317257 kubelet[2109]: E0517 00:48:38.317236 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.317342 kubelet[2109]: E0517 00:48:38.317332 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.317342 kubelet[2109]: W0517 00:48:38.317340 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.317415 kubelet[2109]: E0517 00:48:38.317348 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.317462 kubelet[2109]: E0517 00:48:38.317453 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.317462 kubelet[2109]: W0517 00:48:38.317460 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.317512 kubelet[2109]: E0517 00:48:38.317465 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.317580 kubelet[2109]: E0517 00:48:38.317569 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.317580 kubelet[2109]: W0517 00:48:38.317578 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.317695 kubelet[2109]: E0517 00:48:38.317588 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.317823 kubelet[2109]: E0517 00:48:38.317816 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.317870 kubelet[2109]: W0517 00:48:38.317861 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.317917 kubelet[2109]: E0517 00:48:38.317909 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.318063 kubelet[2109]: E0517 00:48:38.318057 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.318114 kubelet[2109]: W0517 00:48:38.318106 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.318186 kubelet[2109]: E0517 00:48:38.318178 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.318301 kubelet[2109]: E0517 00:48:38.318289 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.318301 kubelet[2109]: W0517 00:48:38.318300 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.318354 kubelet[2109]: E0517 00:48:38.318312 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.318441 kubelet[2109]: E0517 00:48:38.318431 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.318441 kubelet[2109]: W0517 00:48:38.318439 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.318494 kubelet[2109]: E0517 00:48:38.318448 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.318540 kubelet[2109]: E0517 00:48:38.318531 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.318540 kubelet[2109]: W0517 00:48:38.318538 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.318594 kubelet[2109]: E0517 00:48:38.318543 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.318649 kubelet[2109]: E0517 00:48:38.318640 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.318649 kubelet[2109]: W0517 00:48:38.318648 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.318700 kubelet[2109]: E0517 00:48:38.318654 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.318864 kubelet[2109]: E0517 00:48:38.318854 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:48:38.318864 kubelet[2109]: W0517 00:48:38.318863 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:48:38.318917 kubelet[2109]: E0517 00:48:38.318872 2109 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:48:38.618961 env[1249]: time="2025-05-17T00:48:38.618937902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:38.640098 env[1249]: time="2025-05-17T00:48:38.640068923Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:38.649499 env[1249]: time="2025-05-17T00:48:38.649475346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:38.659902 env[1249]: time="2025-05-17T00:48:38.659878787Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:38.660264 env[1249]: time="2025-05-17T00:48:38.660246468Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:48:38.661606 env[1249]: time="2025-05-17T00:48:38.661583065Z" level=info msg="CreateContainer within sandbox \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:48:38.677576 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount241642473.mount: Deactivated successfully. May 17 00:48:38.679828 env[1249]: time="2025-05-17T00:48:38.679802784Z" level=info msg="CreateContainer within sandbox \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5\"" May 17 00:48:38.681165 env[1249]: time="2025-05-17T00:48:38.681146093Z" level=info msg="StartContainer for \"04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5\"" May 17 00:48:38.708077 systemd[1]: Started cri-containerd-04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5.scope. May 17 00:48:38.716000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.716000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc9616727a8 items=0 ppid=2604 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613738303366323737643530366437633937303830623062656432 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit: BPF prog-id=133 op=LOAD May 17 00:48:38.717000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000265368 items=0 ppid=2604 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613738303366323737643530366437633937303830623062656432 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.717000 audit: BPF prog-id=134 op=LOAD May 17 00:48:38.717000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002653b8 items=0 ppid=2604 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613738303366323737643530366437633937303830623062656432 May 17 00:48:38.717000 audit: BPF prog-id=134 op=UNLOAD May 17 00:48:38.717000 audit: BPF prog-id=133 op=UNLOAD May 17 00:48:38.718000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:38.718000 audit: BPF prog-id=135 op=LOAD May 17 00:48:38.718000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000265448 items=0 ppid=2604 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:38.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613738303366323737643530366437633937303830623062656432 May 17 00:48:38.738664 env[1249]: time="2025-05-17T00:48:38.738634347Z" level=info msg="StartContainer for \"04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5\" returns successfully" May 17 00:48:38.742469 systemd[1]: cri-containerd-04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5.scope: Deactivated successfully. May 17 00:48:38.743000 audit: BPF prog-id=135 op=UNLOAD May 17 00:48:38.877092 systemd[1]: run-containerd-runc-k8s.io-04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5-runc.Z0BXaJ.mount: Deactivated successfully. May 17 00:48:38.877193 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5-rootfs.mount: Deactivated successfully. May 17 00:48:38.881485 env[1249]: time="2025-05-17T00:48:38.881448945Z" level=info msg="shim disconnected" id=04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5 May 17 00:48:38.881665 env[1249]: time="2025-05-17T00:48:38.881652507Z" level=warning msg="cleaning up after shim disconnected" id=04a7803f277d506d7c97080b0bed2f7b76f5dde5da8fac7900a9b6063d80dfa5 namespace=k8s.io May 17 00:48:38.881723 env[1249]: time="2025-05-17T00:48:38.881705940Z" level=info msg="cleaning up dead shim" May 17 00:48:38.888788 env[1249]: time="2025-05-17T00:48:38.888760231Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:48:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2802 runtime=io.containerd.runc.v2\n" May 17 00:48:39.244675 env[1249]: time="2025-05-17T00:48:39.244580196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:48:40.192317 kubelet[2109]: E0517 00:48:40.192249 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:42.192911 kubelet[2109]: E0517 00:48:42.192553 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:43.361881 env[1249]: time="2025-05-17T00:48:43.361854822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.375634 env[1249]: time="2025-05-17T00:48:43.375609130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.385223 env[1249]: time="2025-05-17T00:48:43.385195584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.395841 env[1249]: time="2025-05-17T00:48:43.395811790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:43.396155 env[1249]: time="2025-05-17T00:48:43.396136226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:48:43.398732 env[1249]: time="2025-05-17T00:48:43.398705164Z" level=info msg="CreateContainer within sandbox \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:48:43.434279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1139018485.mount: Deactivated successfully. May 17 00:48:43.497844 env[1249]: time="2025-05-17T00:48:43.497786069Z" level=info msg="CreateContainer within sandbox \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401\"" May 17 00:48:43.498208 env[1249]: time="2025-05-17T00:48:43.498195066Z" level=info msg="StartContainer for \"6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401\"" May 17 00:48:43.510400 systemd[1]: Started cri-containerd-6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401.scope. May 17 00:48:43.513319 systemd[1]: run-containerd-runc-k8s.io-6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401-runc.DynciZ.mount: Deactivated successfully. May 17 00:48:43.534000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.543641 kernel: kauditd_printk_skb: 97 callbacks suppressed May 17 00:48:43.543721 kernel: audit: type=1400 audit(1747442923.534:1011): avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.534000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3eafbf2238 items=0 ppid=2604 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.549895 kernel: audit: type=1300 audit(1747442923.534:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3eafbf2238 items=0 ppid=2604 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636237343532366235616235393337656162343564376566353333 May 17 00:48:43.553276 kernel: audit: type=1327 audit(1747442923.534:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636237343532366235616235393337656162343564376566353333 May 17 00:48:43.553306 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.558064 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.558095 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.563577 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.568701 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.568754 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.535000 audit: BPF prog-id=136 op=LOAD May 17 00:48:43.535000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fbc58 items=0 ppid=2604 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636237343532366235616235393337656162343564376566353333 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.544000 audit: BPF prog-id=137 op=LOAD May 17 00:48:43.544000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fbca8 items=0 ppid=2604 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636237343532366235616235393337656162343564376566353333 May 17 00:48:43.554000 audit: BPF prog-id=137 op=UNLOAD May 17 00:48:43.554000 audit: BPF prog-id=136 op=UNLOAD May 17 00:48:43.554000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.554000 audit: BPF prog-id=138 op=LOAD May 17 00:48:43.554000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fbd38 items=0 ppid=2604 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:43.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636237343532366235616235393337656162343564376566353333 May 17 00:48:43.573369 kernel: audit: type=1400 audit(1747442923.535:1012): avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:43.589738 env[1249]: time="2025-05-17T00:48:43.589708814Z" level=info msg="StartContainer for \"6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401\" returns successfully" May 17 00:48:44.191735 kubelet[2109]: E0517 00:48:44.191699 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:45.777868 env[1249]: time="2025-05-17T00:48:45.777805537Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:48:45.781395 systemd[1]: cri-containerd-6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401.scope: Deactivated successfully. May 17 00:48:45.785000 audit: BPF prog-id=138 op=UNLOAD May 17 00:48:45.797670 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401-rootfs.mount: Deactivated successfully. May 17 00:48:45.807428 env[1249]: time="2025-05-17T00:48:45.807332211Z" level=info msg="shim disconnected" id=6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401 May 17 00:48:45.807615 env[1249]: time="2025-05-17T00:48:45.807600316Z" level=warning msg="cleaning up after shim disconnected" id=6ecb74526b5ab5937eab45d7ef533057c9637ba481b8a8093f3949046aa97401 namespace=k8s.io May 17 00:48:45.807681 env[1249]: time="2025-05-17T00:48:45.807669341Z" level=info msg="cleaning up dead shim" May 17 00:48:45.813196 env[1249]: time="2025-05-17T00:48:45.813167059Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:48:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2867 runtime=io.containerd.runc.v2\n" May 17 00:48:45.921295 kubelet[2109]: I0517 00:48:45.914951 2109 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:48:46.209237 systemd[1]: Created slice kubepods-burstable-pod03278353_2b3c_4f49_8cf7_8e856b7ac899.slice. May 17 00:48:46.218753 systemd[1]: Created slice kubepods-burstable-pod29cd1609_7116_4876_aea6_bac14afee06d.slice. May 17 00:48:46.223127 systemd[1]: Created slice kubepods-besteffort-pod58e37122_c913_439c_b4ab_707963c2e71f.slice. May 17 00:48:46.229598 systemd[1]: Created slice kubepods-besteffort-pod0a140439_ab4b_4a0e_8c05_2786e62eccb3.slice. May 17 00:48:46.237023 systemd[1]: Created slice kubepods-besteffort-podef04eeb4_0013_414a_a9ac_8d69c29c2d59.slice. May 17 00:48:46.245189 systemd[1]: Created slice kubepods-besteffort-pod347fd784_22c2_4e9c_b501_28fa3f1ab25c.slice. May 17 00:48:46.250624 kubelet[2109]: I0517 00:48:46.250603 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/29cd1609-7116-4876-aea6-bac14afee06d-config-volume\") pod \"coredns-668d6bf9bc-nwqz5\" (UID: \"29cd1609-7116-4876-aea6-bac14afee06d\") " pod="kube-system/coredns-668d6bf9bc-nwqz5" May 17 00:48:46.250738 kubelet[2109]: I0517 00:48:46.250726 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-ca-bundle\") pod \"whisker-575d8ff7f9-sfwjf\" (UID: \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\") " pod="calico-system/whisker-575d8ff7f9-sfwjf" May 17 00:48:46.250801 kubelet[2109]: I0517 00:48:46.250792 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/03278353-2b3c-4f49-8cf7-8e856b7ac899-config-volume\") pod \"coredns-668d6bf9bc-jd5qf\" (UID: \"03278353-2b3c-4f49-8cf7-8e856b7ac899\") " pod="kube-system/coredns-668d6bf9bc-jd5qf" May 17 00:48:46.250858 kubelet[2109]: I0517 00:48:46.250849 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4zkj2\" (UniqueName: \"kubernetes.io/projected/03278353-2b3c-4f49-8cf7-8e856b7ac899-kube-api-access-4zkj2\") pod \"coredns-668d6bf9bc-jd5qf\" (UID: \"03278353-2b3c-4f49-8cf7-8e856b7ac899\") " pod="kube-system/coredns-668d6bf9bc-jd5qf" May 17 00:48:46.250915 kubelet[2109]: I0517 00:48:46.250906 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8l8s\" (UniqueName: \"kubernetes.io/projected/29cd1609-7116-4876-aea6-bac14afee06d-kube-api-access-s8l8s\") pod \"coredns-668d6bf9bc-nwqz5\" (UID: \"29cd1609-7116-4876-aea6-bac14afee06d\") " pod="kube-system/coredns-668d6bf9bc-nwqz5" May 17 00:48:46.250970 kubelet[2109]: I0517 00:48:46.250961 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s9hqq\" (UniqueName: \"kubernetes.io/projected/ef04eeb4-0013-414a-a9ac-8d69c29c2d59-kube-api-access-s9hqq\") pod \"calico-apiserver-9c77f996f-ks4xp\" (UID: \"ef04eeb4-0013-414a-a9ac-8d69c29c2d59\") " pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" May 17 00:48:46.251028 kubelet[2109]: I0517 00:48:46.251019 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fnssx\" (UniqueName: \"kubernetes.io/projected/1cb71b2a-3dd4-4752-90f5-3091de8ccd48-kube-api-access-fnssx\") pod \"goldmane-78d55f7ddc-58zhp\" (UID: \"1cb71b2a-3dd4-4752-90f5-3091de8ccd48\") " pod="calico-system/goldmane-78d55f7ddc-58zhp" May 17 00:48:46.251085 kubelet[2109]: I0517 00:48:46.251075 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pzkbw\" (UniqueName: \"kubernetes.io/projected/58e37122-c913-439c-b4ab-707963c2e71f-kube-api-access-pzkbw\") pod \"calico-apiserver-9c77f996f-wp585\" (UID: \"58e37122-c913-439c-b4ab-707963c2e71f\") " pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" May 17 00:48:46.251143 kubelet[2109]: I0517 00:48:46.251134 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vmltz\" (UniqueName: \"kubernetes.io/projected/0a140439-ab4b-4a0e-8c05-2786e62eccb3-kube-api-access-vmltz\") pod \"whisker-575d8ff7f9-sfwjf\" (UID: \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\") " pod="calico-system/whisker-575d8ff7f9-sfwjf" May 17 00:48:46.251199 kubelet[2109]: I0517 00:48:46.251189 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1cb71b2a-3dd4-4752-90f5-3091de8ccd48-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-58zhp\" (UID: \"1cb71b2a-3dd4-4752-90f5-3091de8ccd48\") " pod="calico-system/goldmane-78d55f7ddc-58zhp" May 17 00:48:46.251256 kubelet[2109]: I0517 00:48:46.251247 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/1cb71b2a-3dd4-4752-90f5-3091de8ccd48-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-58zhp\" (UID: \"1cb71b2a-3dd4-4752-90f5-3091de8ccd48\") " pod="calico-system/goldmane-78d55f7ddc-58zhp" May 17 00:48:46.251315 kubelet[2109]: I0517 00:48:46.251305 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9p7pn\" (UniqueName: \"kubernetes.io/projected/347fd784-22c2-4e9c-b501-28fa3f1ab25c-kube-api-access-9p7pn\") pod \"calico-kube-controllers-6c588fdff4-cc4mr\" (UID: \"347fd784-22c2-4e9c-b501-28fa3f1ab25c\") " pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" May 17 00:48:46.251392 kubelet[2109]: I0517 00:48:46.251382 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/347fd784-22c2-4e9c-b501-28fa3f1ab25c-tigera-ca-bundle\") pod \"calico-kube-controllers-6c588fdff4-cc4mr\" (UID: \"347fd784-22c2-4e9c-b501-28fa3f1ab25c\") " pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" May 17 00:48:46.251464 kubelet[2109]: I0517 00:48:46.251456 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ef04eeb4-0013-414a-a9ac-8d69c29c2d59-calico-apiserver-certs\") pod \"calico-apiserver-9c77f996f-ks4xp\" (UID: \"ef04eeb4-0013-414a-a9ac-8d69c29c2d59\") " pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" May 17 00:48:46.251522 kubelet[2109]: I0517 00:48:46.251513 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/1cb71b2a-3dd4-4752-90f5-3091de8ccd48-config\") pod \"goldmane-78d55f7ddc-58zhp\" (UID: \"1cb71b2a-3dd4-4752-90f5-3091de8ccd48\") " pod="calico-system/goldmane-78d55f7ddc-58zhp" May 17 00:48:46.251585 kubelet[2109]: I0517 00:48:46.251576 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-backend-key-pair\") pod \"whisker-575d8ff7f9-sfwjf\" (UID: \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\") " pod="calico-system/whisker-575d8ff7f9-sfwjf" May 17 00:48:46.251641 kubelet[2109]: I0517 00:48:46.251630 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/58e37122-c913-439c-b4ab-707963c2e71f-calico-apiserver-certs\") pod \"calico-apiserver-9c77f996f-wp585\" (UID: \"58e37122-c913-439c-b4ab-707963c2e71f\") " pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" May 17 00:48:46.251658 systemd[1]: Created slice kubepods-besteffort-pod1cb71b2a_3dd4_4752_90f5_3091de8ccd48.slice. May 17 00:48:46.261302 systemd[1]: Created slice kubepods-besteffort-podcd10f665_ce0e_4c29_b06e_afa77ff31d8a.slice. May 17 00:48:46.265686 env[1249]: time="2025-05-17T00:48:46.264375122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:48:46.266456 env[1249]: time="2025-05-17T00:48:46.266252357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xpczn,Uid:cd10f665-ce0e-4c29-b06e-afa77ff31d8a,Namespace:calico-system,Attempt:0,}" May 17 00:48:46.517354 env[1249]: time="2025-05-17T00:48:46.516862554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jd5qf,Uid:03278353-2b3c-4f49-8cf7-8e856b7ac899,Namespace:kube-system,Attempt:0,}" May 17 00:48:46.522793 env[1249]: time="2025-05-17T00:48:46.522646230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nwqz5,Uid:29cd1609-7116-4876-aea6-bac14afee06d,Namespace:kube-system,Attempt:0,}" May 17 00:48:46.527377 env[1249]: time="2025-05-17T00:48:46.527299401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-wp585,Uid:58e37122-c913-439c-b4ab-707963c2e71f,Namespace:calico-apiserver,Attempt:0,}" May 17 00:48:46.534948 env[1249]: time="2025-05-17T00:48:46.534926654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-575d8ff7f9-sfwjf,Uid:0a140439-ab4b-4a0e-8c05-2786e62eccb3,Namespace:calico-system,Attempt:0,}" May 17 00:48:46.540500 env[1249]: time="2025-05-17T00:48:46.540481244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-ks4xp,Uid:ef04eeb4-0013-414a-a9ac-8d69c29c2d59,Namespace:calico-apiserver,Attempt:0,}" May 17 00:48:46.550907 env[1249]: time="2025-05-17T00:48:46.550879087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c588fdff4-cc4mr,Uid:347fd784-22c2-4e9c-b501-28fa3f1ab25c,Namespace:calico-system,Attempt:0,}" May 17 00:48:46.557655 env[1249]: time="2025-05-17T00:48:46.557636309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-58zhp,Uid:1cb71b2a-3dd4-4752-90f5-3091de8ccd48,Namespace:calico-system,Attempt:0,}" May 17 00:48:47.019123 env[1249]: time="2025-05-17T00:48:47.019041993Z" level=error msg="Failed to destroy network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.020634 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e-shm.mount: Deactivated successfully. May 17 00:48:47.021744 env[1249]: time="2025-05-17T00:48:47.021718512Z" level=error msg="encountered an error cleaning up failed sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.021785 env[1249]: time="2025-05-17T00:48:47.021758040Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-575d8ff7f9-sfwjf,Uid:0a140439-ab4b-4a0e-8c05-2786e62eccb3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.024253 kubelet[2109]: E0517 00:48:47.024220 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.026556 env[1249]: time="2025-05-17T00:48:47.026522838Z" level=error msg="Failed to destroy network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.028194 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246-shm.mount: Deactivated successfully. May 17 00:48:47.029718 kubelet[2109]: E0517 00:48:47.026411 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-575d8ff7f9-sfwjf" May 17 00:48:47.029784 kubelet[2109]: E0517 00:48:47.029725 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-575d8ff7f9-sfwjf" May 17 00:48:47.029819 kubelet[2109]: E0517 00:48:47.029776 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-575d8ff7f9-sfwjf_calico-system(0a140439-ab4b-4a0e-8c05-2786e62eccb3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-575d8ff7f9-sfwjf_calico-system(0a140439-ab4b-4a0e-8c05-2786e62eccb3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-575d8ff7f9-sfwjf" podUID="0a140439-ab4b-4a0e-8c05-2786e62eccb3" May 17 00:48:47.031121 env[1249]: time="2025-05-17T00:48:47.031019212Z" level=error msg="encountered an error cleaning up failed sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.031194 env[1249]: time="2025-05-17T00:48:47.031121890Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nwqz5,Uid:29cd1609-7116-4876-aea6-bac14afee06d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.031717 kubelet[2109]: E0517 00:48:47.031626 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.031717 kubelet[2109]: E0517 00:48:47.031667 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-nwqz5" May 17 00:48:47.031717 kubelet[2109]: E0517 00:48:47.031681 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-nwqz5" May 17 00:48:47.032925 kubelet[2109]: E0517 00:48:47.032662 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-nwqz5_kube-system(29cd1609-7116-4876-aea6-bac14afee06d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-nwqz5_kube-system(29cd1609-7116-4876-aea6-bac14afee06d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-nwqz5" podUID="29cd1609-7116-4876-aea6-bac14afee06d" May 17 00:48:47.049348 env[1249]: time="2025-05-17T00:48:47.049297891Z" level=error msg="Failed to destroy network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.051030 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488-shm.mount: Deactivated successfully. May 17 00:48:47.051462 env[1249]: time="2025-05-17T00:48:47.051384946Z" level=error msg="encountered an error cleaning up failed sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.051534 env[1249]: time="2025-05-17T00:48:47.051510688Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-58zhp,Uid:1cb71b2a-3dd4-4752-90f5-3091de8ccd48,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.052112 kubelet[2109]: E0517 00:48:47.051997 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.052112 kubelet[2109]: E0517 00:48:47.052034 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-58zhp" May 17 00:48:47.052112 kubelet[2109]: E0517 00:48:47.052049 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-58zhp" May 17 00:48:47.052214 kubelet[2109]: E0517 00:48:47.052077 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-58zhp_calico-system(1cb71b2a-3dd4-4752-90f5-3091de8ccd48)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-58zhp_calico-system(1cb71b2a-3dd4-4752-90f5-3091de8ccd48)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-58zhp" podUID="1cb71b2a-3dd4-4752-90f5-3091de8ccd48" May 17 00:48:47.059318 env[1249]: time="2025-05-17T00:48:47.059278759Z" level=error msg="Failed to destroy network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.060943 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939-shm.mount: Deactivated successfully. May 17 00:48:47.062005 env[1249]: time="2025-05-17T00:48:47.061980135Z" level=error msg="encountered an error cleaning up failed sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.062097 env[1249]: time="2025-05-17T00:48:47.062080700Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c588fdff4-cc4mr,Uid:347fd784-22c2-4e9c-b501-28fa3f1ab25c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.062285 env[1249]: time="2025-05-17T00:48:47.062221098Z" level=error msg="Failed to destroy network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.062414 kubelet[2109]: E0517 00:48:47.062354 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.062464 kubelet[2109]: E0517 00:48:47.062430 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" May 17 00:48:47.062464 kubelet[2109]: E0517 00:48:47.062458 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" May 17 00:48:47.062512 kubelet[2109]: E0517 00:48:47.062499 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6c588fdff4-cc4mr_calico-system(347fd784-22c2-4e9c-b501-28fa3f1ab25c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6c588fdff4-cc4mr_calico-system(347fd784-22c2-4e9c-b501-28fa3f1ab25c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" podUID="347fd784-22c2-4e9c-b501-28fa3f1ab25c" May 17 00:48:47.063876 env[1249]: time="2025-05-17T00:48:47.063484957Z" level=error msg="encountered an error cleaning up failed sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.063876 env[1249]: time="2025-05-17T00:48:47.063522558Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-wp585,Uid:58e37122-c913-439c-b4ab-707963c2e71f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.063999 kubelet[2109]: E0517 00:48:47.063892 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.063999 kubelet[2109]: E0517 00:48:47.063919 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" May 17 00:48:47.063999 kubelet[2109]: E0517 00:48:47.063932 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" May 17 00:48:47.064538 kubelet[2109]: E0517 00:48:47.063971 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-9c77f996f-wp585_calico-apiserver(58e37122-c913-439c-b4ab-707963c2e71f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-9c77f996f-wp585_calico-apiserver(58e37122-c913-439c-b4ab-707963c2e71f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" podUID="58e37122-c913-439c-b4ab-707963c2e71f" May 17 00:48:47.088519 env[1249]: time="2025-05-17T00:48:47.088481934Z" level=error msg="Failed to destroy network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.088849 env[1249]: time="2025-05-17T00:48:47.088830563Z" level=error msg="encountered an error cleaning up failed sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.088939541Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-ks4xp,Uid:ef04eeb4-0013-414a-a9ac-8d69c29c2d59,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.090494282Z" level=error msg="Failed to destroy network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.090704172Z" level=error msg="encountered an error cleaning up failed sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.090731857Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jd5qf,Uid:03278353-2b3c-4f49-8cf7-8e856b7ac899,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.090534052Z" level=error msg="Failed to destroy network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.091043909Z" level=error msg="encountered an error cleaning up failed sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092487 env[1249]: time="2025-05-17T00:48:47.091066736Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xpczn,Uid:cd10f665-ce0e-4c29-b06e-afa77ff31d8a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092884 kubelet[2109]: E0517 00:48:47.089142 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.092884 kubelet[2109]: E0517 00:48:47.089189 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" May 17 00:48:47.092884 kubelet[2109]: E0517 00:48:47.089202 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" May 17 00:48:47.093035 kubelet[2109]: E0517 00:48:47.089384 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-9c77f996f-ks4xp_calico-apiserver(ef04eeb4-0013-414a-a9ac-8d69c29c2d59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-9c77f996f-ks4xp_calico-apiserver(ef04eeb4-0013-414a-a9ac-8d69c29c2d59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" podUID="ef04eeb4-0013-414a-a9ac-8d69c29c2d59" May 17 00:48:47.093035 kubelet[2109]: E0517 00:48:47.090846 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.093035 kubelet[2109]: E0517 00:48:47.090868 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-jd5qf" May 17 00:48:47.098869 kubelet[2109]: E0517 00:48:47.090879 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-jd5qf" May 17 00:48:47.098869 kubelet[2109]: E0517 00:48:47.090901 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-jd5qf_kube-system(03278353-2b3c-4f49-8cf7-8e856b7ac899)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-jd5qf_kube-system(03278353-2b3c-4f49-8cf7-8e856b7ac899)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-jd5qf" podUID="03278353-2b3c-4f49-8cf7-8e856b7ac899" May 17 00:48:47.098869 kubelet[2109]: E0517 00:48:47.091318 2109 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.098979 kubelet[2109]: E0517 00:48:47.091378 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xpczn" May 17 00:48:47.098979 kubelet[2109]: E0517 00:48:47.091389 2109 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xpczn" May 17 00:48:47.098979 kubelet[2109]: E0517 00:48:47.091411 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xpczn_calico-system(cd10f665-ce0e-4c29-b06e-afa77ff31d8a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xpczn_calico-system(cd10f665-ce0e-4c29-b06e-afa77ff31d8a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:47.267107 kubelet[2109]: I0517 00:48:47.266556 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:48:47.271056 kubelet[2109]: I0517 00:48:47.269289 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:48:47.274637 env[1249]: time="2025-05-17T00:48:47.273261506Z" level=info msg="StopPodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\"" May 17 00:48:47.274912 env[1249]: time="2025-05-17T00:48:47.274885430Z" level=info msg="StopPodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\"" May 17 00:48:47.275828 kubelet[2109]: I0517 00:48:47.275597 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:48:47.275976 env[1249]: time="2025-05-17T00:48:47.275959034Z" level=info msg="StopPodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\"" May 17 00:48:47.277289 kubelet[2109]: I0517 00:48:47.277270 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:48:47.277649 env[1249]: time="2025-05-17T00:48:47.277625040Z" level=info msg="StopPodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\"" May 17 00:48:47.279444 kubelet[2109]: I0517 00:48:47.279428 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:48:47.280001 env[1249]: time="2025-05-17T00:48:47.279972968Z" level=info msg="StopPodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\"" May 17 00:48:47.280577 kubelet[2109]: I0517 00:48:47.280560 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:48:47.280844 env[1249]: time="2025-05-17T00:48:47.280826605Z" level=info msg="StopPodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\"" May 17 00:48:47.281648 kubelet[2109]: I0517 00:48:47.281624 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:48:47.281998 env[1249]: time="2025-05-17T00:48:47.281980782Z" level=info msg="StopPodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\"" May 17 00:48:47.283092 kubelet[2109]: I0517 00:48:47.283076 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:48:47.283319 env[1249]: time="2025-05-17T00:48:47.283304288Z" level=info msg="StopPodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\"" May 17 00:48:47.309397 env[1249]: time="2025-05-17T00:48:47.309349690Z" level=error msg="StopPodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" failed" error="failed to destroy network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.309549 kubelet[2109]: E0517 00:48:47.309513 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:48:47.309608 kubelet[2109]: E0517 00:48:47.309564 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488"} May 17 00:48:47.309638 kubelet[2109]: E0517 00:48:47.309618 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1cb71b2a-3dd4-4752-90f5-3091de8ccd48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.309690 kubelet[2109]: E0517 00:48:47.309633 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1cb71b2a-3dd4-4752-90f5-3091de8ccd48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-58zhp" podUID="1cb71b2a-3dd4-4752-90f5-3091de8ccd48" May 17 00:48:47.335727 env[1249]: time="2025-05-17T00:48:47.335690782Z" level=error msg="StopPodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" failed" error="failed to destroy network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.336103 kubelet[2109]: E0517 00:48:47.336005 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:48:47.336103 kubelet[2109]: E0517 00:48:47.336035 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246"} May 17 00:48:47.336103 kubelet[2109]: E0517 00:48:47.336058 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29cd1609-7116-4876-aea6-bac14afee06d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.336103 kubelet[2109]: E0517 00:48:47.336076 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29cd1609-7116-4876-aea6-bac14afee06d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-nwqz5" podUID="29cd1609-7116-4876-aea6-bac14afee06d" May 17 00:48:47.342500 env[1249]: time="2025-05-17T00:48:47.342453772Z" level=error msg="StopPodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" failed" error="failed to destroy network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.342666 kubelet[2109]: E0517 00:48:47.342641 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:48:47.342722 kubelet[2109]: E0517 00:48:47.342676 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939"} May 17 00:48:47.342722 kubelet[2109]: E0517 00:48:47.342704 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"347fd784-22c2-4e9c-b501-28fa3f1ab25c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.342800 kubelet[2109]: E0517 00:48:47.342736 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"347fd784-22c2-4e9c-b501-28fa3f1ab25c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" podUID="347fd784-22c2-4e9c-b501-28fa3f1ab25c" May 17 00:48:47.361795 env[1249]: time="2025-05-17T00:48:47.361756614Z" level=error msg="StopPodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" failed" error="failed to destroy network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.361988 kubelet[2109]: E0517 00:48:47.361965 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:48:47.362050 kubelet[2109]: E0517 00:48:47.362006 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad"} May 17 00:48:47.362050 kubelet[2109]: E0517 00:48:47.362030 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"58e37122-c913-439c-b4ab-707963c2e71f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.362050 kubelet[2109]: E0517 00:48:47.362046 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"58e37122-c913-439c-b4ab-707963c2e71f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" podUID="58e37122-c913-439c-b4ab-707963c2e71f" May 17 00:48:47.372413 env[1249]: time="2025-05-17T00:48:47.372382200Z" level=error msg="StopPodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" failed" error="failed to destroy network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.372641 kubelet[2109]: E0517 00:48:47.372613 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:48:47.372683 kubelet[2109]: E0517 00:48:47.372648 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a"} May 17 00:48:47.372706 kubelet[2109]: E0517 00:48:47.372680 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"03278353-2b3c-4f49-8cf7-8e856b7ac899\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.372706 kubelet[2109]: E0517 00:48:47.372700 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"03278353-2b3c-4f49-8cf7-8e856b7ac899\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-jd5qf" podUID="03278353-2b3c-4f49-8cf7-8e856b7ac899" May 17 00:48:47.372794 env[1249]: time="2025-05-17T00:48:47.372772049Z" level=error msg="StopPodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" failed" error="failed to destroy network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.372887 kubelet[2109]: E0517 00:48:47.372867 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:48:47.372923 kubelet[2109]: E0517 00:48:47.372885 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e"} May 17 00:48:47.372923 kubelet[2109]: E0517 00:48:47.372909 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.372989 kubelet[2109]: E0517 00:48:47.372921 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-575d8ff7f9-sfwjf" podUID="0a140439-ab4b-4a0e-8c05-2786e62eccb3" May 17 00:48:47.376157 env[1249]: time="2025-05-17T00:48:47.376135807Z" level=error msg="StopPodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" failed" error="failed to destroy network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.376315 kubelet[2109]: E0517 00:48:47.376298 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:48:47.376352 kubelet[2109]: E0517 00:48:47.376325 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc"} May 17 00:48:47.376352 kubelet[2109]: E0517 00:48:47.376339 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.376428 kubelet[2109]: E0517 00:48:47.376349 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cd10f665-ce0e-4c29-b06e-afa77ff31d8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xpczn" podUID="cd10f665-ce0e-4c29-b06e-afa77ff31d8a" May 17 00:48:47.387178 env[1249]: time="2025-05-17T00:48:47.387148004Z" level=error msg="StopPodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" failed" error="failed to destroy network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:48:47.387375 kubelet[2109]: E0517 00:48:47.387292 2109 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:48:47.387375 kubelet[2109]: E0517 00:48:47.387316 2109 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671"} May 17 00:48:47.387375 kubelet[2109]: E0517 00:48:47.387337 2109 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ef04eeb4-0013-414a-a9ac-8d69c29c2d59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:48:47.387491 kubelet[2109]: E0517 00:48:47.387349 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ef04eeb4-0013-414a-a9ac-8d69c29c2d59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" podUID="ef04eeb4-0013-414a-a9ac-8d69c29c2d59" May 17 00:48:47.797603 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671-shm.mount: Deactivated successfully. May 17 00:48:47.797664 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad-shm.mount: Deactivated successfully. May 17 00:48:47.797705 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a-shm.mount: Deactivated successfully. May 17 00:48:47.797740 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc-shm.mount: Deactivated successfully. May 17 00:48:53.872637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1947446049.mount: Deactivated successfully. May 17 00:48:53.894435 env[1249]: time="2025-05-17T00:48:53.894391166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:53.896149 env[1249]: time="2025-05-17T00:48:53.896136455Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:53.897851 env[1249]: time="2025-05-17T00:48:53.897297596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:53.923774 env[1249]: time="2025-05-17T00:48:53.923742855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:48:53.924093 env[1249]: time="2025-05-17T00:48:53.924076895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:48:53.995581 env[1249]: time="2025-05-17T00:48:53.995549574Z" level=info msg="CreateContainer within sandbox \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:48:54.021353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1611702590.mount: Deactivated successfully. May 17 00:48:54.025070 env[1249]: time="2025-05-17T00:48:54.025046134Z" level=info msg="CreateContainer within sandbox \"db3fc1eb98326d434f96b7d483410e5bbd394f15612f4ec2b18150576cefd5d9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"69c5dccb467860cc3790f4cdfa603d9ddbee2ac3b2ce69846819a85378374617\"" May 17 00:48:54.026524 env[1249]: time="2025-05-17T00:48:54.026509937Z" level=info msg="StartContainer for \"69c5dccb467860cc3790f4cdfa603d9ddbee2ac3b2ce69846819a85378374617\"" May 17 00:48:54.055808 systemd[1]: Started cri-containerd-69c5dccb467860cc3790f4cdfa603d9ddbee2ac3b2ce69846819a85378374617.scope. May 17 00:48:54.074012 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:48:54.080184 kernel: audit: type=1400 audit(1747442934.065:1018): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.082706 kernel: audit: type=1300 audit(1747442934.065:1018): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fdc70565588 items=0 ppid=2604 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.085445 kernel: audit: type=1327 audit(1747442934.065:1018): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633564636362343637383630636333373930663463646661363033 May 17 00:48:54.085480 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.085496 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.085509 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.097474 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.097525 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.097540 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.097554 kernel: audit: type=1400 audit(1747442934.065:1019): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fdc70565588 items=0 ppid=2604 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633564636362343637383630636333373930663463646661363033 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.065000 audit: BPF prog-id=139 op=LOAD May 17 00:48:54.065000 audit[3250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002b7ed8 items=0 ppid=2604 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633564636362343637383630636333373930663463646661363033 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.069000 audit: BPF prog-id=140 op=LOAD May 17 00:48:54.069000 audit[3250]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002b7f28 items=0 ppid=2604 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633564636362343637383630636333373930663463646661363033 May 17 00:48:54.073000 audit: BPF prog-id=140 op=UNLOAD May 17 00:48:54.073000 audit: BPF prog-id=139 op=UNLOAD May 17 00:48:54.073000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:54.073000 audit: BPF prog-id=141 op=LOAD May 17 00:48:54.073000 audit[3250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002b7fb8 items=0 ppid=2604 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:54.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633564636362343637383630636333373930663463646661363033 May 17 00:48:54.109116 env[1249]: time="2025-05-17T00:48:54.099070550Z" level=info msg="StartContainer for \"69c5dccb467860cc3790f4cdfa603d9ddbee2ac3b2ce69846819a85378374617\" returns successfully" May 17 00:48:54.313403 kubelet[2109]: I0517 00:48:54.309911 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dqq57" podStartSLOduration=0.855427197 podStartE2EDuration="20.309892503s" podCreationTimestamp="2025-05-17 00:48:34 +0000 UTC" firstStartedPulling="2025-05-17 00:48:34.47030546 +0000 UTC m=+18.480792261" lastFinishedPulling="2025-05-17 00:48:53.924770766 +0000 UTC m=+37.935257567" observedRunningTime="2025-05-17 00:48:54.308938494 +0000 UTC m=+38.319425304" watchObservedRunningTime="2025-05-17 00:48:54.309892503 +0000 UTC m=+38.320379306" May 17 00:48:54.588371 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:48:54.588487 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:48:54.822951 env[1249]: time="2025-05-17T00:48:54.822925765Z" level=info msg="StopPodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\"" May 17 00:48:55.029000 audit[3355]: AVC avc: denied { write } for pid=3355 comm="tee" name="fd" dev="proc" ino=36985 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.029000 audit[3355]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcca8007f1 a2=241 a3=1b6 items=1 ppid=3345 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.029000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:48:55.029000 audit: PATH item=0 name="/dev/fd/63" inode=36982 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.029000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.076000 audit[3393]: AVC avc: denied { write } for pid=3393 comm="tee" name="fd" dev="proc" ino=37018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.076000 audit[3393]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe04d1f7e2 a2=241 a3=1b6 items=1 ppid=3342 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.076000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:48:55.076000 audit: PATH item=0 name="/dev/fd/63" inode=36476 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.079000 audit[3399]: AVC avc: denied { write } for pid=3399 comm="tee" name="fd" dev="proc" ino=37022 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.080000 audit[3392]: AVC avc: denied { write } for pid=3392 comm="tee" name="fd" dev="proc" ino=37025 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.082000 audit[3398]: AVC avc: denied { write } for pid=3398 comm="tee" name="fd" dev="proc" ino=37028 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.082000 audit[3395]: AVC avc: denied { write } for pid=3395 comm="tee" name="fd" dev="proc" ino=37031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.080000 audit[3392]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc285d77f1 a2=241 a3=1b6 items=1 ppid=3339 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.079000 audit[3399]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7de177f2 a2=241 a3=1b6 items=1 ppid=3341 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.080000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:48:55.080000 audit: PATH item=0 name="/dev/fd/63" inode=37007 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.079000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:48:55.079000 audit: PATH item=0 name="/dev/fd/63" inode=36477 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.079000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.082000 audit[3398]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff049627e1 a2=241 a3=1b6 items=1 ppid=3335 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.082000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:48:55.082000 audit: PATH item=0 name="/dev/fd/63" inode=37013 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.082000 audit[3395]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8bfdc7f1 a2=241 a3=1b6 items=1 ppid=3333 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.082000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.082000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:48:55.082000 audit: PATH item=0 name="/dev/fd/63" inode=37012 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.082000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.094000 audit[3406]: AVC avc: denied { write } for pid=3406 comm="tee" name="fd" dev="proc" ino=37038 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:48:55.094000 audit[3406]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb27f77f3 a2=241 a3=1b6 items=1 ppid=3331 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.094000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:48:55.094000 audit: PATH item=0 name="/dev/fd/63" inode=37014 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:48:55.094000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.297000 audit: BPF prog-id=142 op=LOAD May 17 00:48:55.297000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe98257010 a2=98 a3=3 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.297000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.297000 audit: BPF prog-id=142 op=UNLOAD May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit: BPF prog-id=143 op=LOAD May 17 00:48:55.299000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe98256e00 a2=94 a3=54428f items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.299000 audit: BPF prog-id=143 op=UNLOAD May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.299000 audit: BPF prog-id=144 op=LOAD May 17 00:48:55.299000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe98256e30 a2=94 a3=2 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.299000 audit: BPF prog-id=144 op=UNLOAD May 17 00:48:55.374000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit: BPF prog-id=145 op=LOAD May 17 00:48:55.374000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe98256cf0 a2=94 a3=1 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.374000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.374000 audit: BPF prog-id=145 op=UNLOAD May 17 00:48:55.374000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.374000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe98256dc0 a2=50 a3=7ffe98256ea0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.374000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe98256d00 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe98256d30 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe98256c40 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe98256d50 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe98256d30 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe98256d20 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe98256d50 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe98256d30 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe98256d50 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe98256d20 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe98256d90 a2=28 a3=0 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe98256b40 a2=50 a3=1 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit: BPF prog-id=146 op=LOAD May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe98256b40 a2=94 a3=5 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit: BPF prog-id=146 op=UNLOAD May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe98256bf0 a2=50 a3=1 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe98256d10 a2=4 a3=38 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.381000 audit[3443]: AVC avc: denied { confidentiality } for pid=3443 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:55.381000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe98256d60 a2=94 a3=6 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { confidentiality } for pid=3443 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:55.382000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe98256510 a2=94 a3=88 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.382000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.382000 audit[3443]: AVC avc: denied { confidentiality } for pid=3443 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:55.382000 audit[3443]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe98256510 a2=94 a3=88 items=0 ppid=3346 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.382000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:48:55.422000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.422000 audit: BPF prog-id=147 op=LOAD May 17 00:48:55.422000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbbf151c0 a2=98 a3=1999999999999999 items=0 ppid=3346 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:48:55.423000 audit: BPF prog-id=147 op=UNLOAD May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit: BPF prog-id=148 op=LOAD May 17 00:48:55.423000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbbf150a0 a2=94 a3=ffff items=0 ppid=3346 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.423000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:48:55.423000 audit: BPF prog-id=148 op=UNLOAD May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.423000 audit: BPF prog-id=149 op=LOAD May 17 00:48:55.423000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbbf150e0 a2=94 a3=7ffdbbf152c0 items=0 ppid=3346 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.423000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:48:55.423000 audit: BPF prog-id=149 op=UNLOAD May 17 00:48:55.495228 systemd-networkd[1065]: vxlan.calico: Link UP May 17 00:48:55.495233 systemd-networkd[1065]: vxlan.calico: Gained carrier May 17 00:48:55.512000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.512000 audit: BPF prog-id=150 op=LOAD May 17 00:48:55.512000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6267b7c0 a2=98 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.512000 audit: BPF prog-id=150 op=UNLOAD May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit: BPF prog-id=151 op=LOAD May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6267b5d0 a2=94 a3=54428f items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit: BPF prog-id=151 op=UNLOAD May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit: BPF prog-id=152 op=LOAD May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6267b600 a2=94 a3=2 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit: BPF prog-id=152 op=UNLOAD May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6267b4d0 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6267b500 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6267b410 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6267b520 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6267b500 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6267b4f0 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6267b520 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6267b500 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6267b520 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6267b4f0 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6267b560 a2=28 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.513000 audit: BPF prog-id=153 op=LOAD May 17 00:48:55.513000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6267b3d0 a2=94 a3=0 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.513000 audit: BPF prog-id=153 op=UNLOAD May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe6267b3c0 a2=50 a3=2800 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe6267b3c0 a2=50 a3=2800 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit: BPF prog-id=154 op=LOAD May 17 00:48:55.514000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6267abe0 a2=94 a3=2 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.514000 audit: BPF prog-id=154 op=UNLOAD May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.514000 audit: BPF prog-id=155 op=LOAD May 17 00:48:55.514000 audit[3472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6267ace0 a2=94 a3=30 items=0 ppid=3346 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.514000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit: BPF prog-id=156 op=LOAD May 17 00:48:55.515000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7a9df890 a2=98 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.515000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.515000 audit: BPF prog-id=156 op=UNLOAD May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit: BPF prog-id=157 op=LOAD May 17 00:48:55.515000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7a9df680 a2=94 a3=54428f items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.515000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.515000 audit: BPF prog-id=157 op=UNLOAD May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.515000 audit: BPF prog-id=158 op=LOAD May 17 00:48:55.515000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7a9df6b0 a2=94 a3=2 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.515000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.515000 audit: BPF prog-id=158 op=UNLOAD May 17 00:48:55.613000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit: BPF prog-id=159 op=LOAD May 17 00:48:55.613000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7a9df570 a2=94 a3=1 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.613000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.613000 audit: BPF prog-id=159 op=UNLOAD May 17 00:48:55.613000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.613000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7a9df640 a2=50 a3=7fff7a9df720 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.613000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7a9df580 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7a9df5b0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7a9df4c0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7a9df5d0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7a9df5b0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7a9df5a0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7a9df5d0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7a9df5b0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7a9df5d0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7a9df5a0 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7a9df610 a2=28 a3=0 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7a9df3c0 a2=50 a3=1 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit: BPF prog-id=160 op=LOAD May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7a9df3c0 a2=94 a3=5 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.621000 audit: BPF prog-id=160 op=UNLOAD May 17 00:48:55.621000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.621000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7a9df470 a2=50 a3=1 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.621000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff7a9df590 a2=4 a3=38 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { confidentiality } for pid=3474 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:55.622000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7a9df5e0 a2=94 a3=6 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { confidentiality } for pid=3474 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:55.622000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7a9ded90 a2=94 a3=88 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.622000 audit[3474]: AVC avc: denied { confidentiality } for pid=3474 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:48:55.622000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7a9ded90 a2=94 a3=88 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.623000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.623000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7a9e07c0 a2=10 a3=f8f00800 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.623000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.623000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7a9e0660 a2=10 a3=3 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.623000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.623000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7a9e0600 a2=10 a3=3 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.623000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:55.623000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7a9e0600 a2=10 a3=7 items=0 ppid=3346 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:48:55.637000 audit: BPF prog-id=155 op=UNLOAD May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:54.908 [INFO][3304] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:54.909 [INFO][3304] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" iface="eth0" netns="/var/run/netns/cni-f4777f31-96f2-2ff0-854d-e141de22dd9f" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:54.909 [INFO][3304] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" iface="eth0" netns="/var/run/netns/cni-f4777f31-96f2-2ff0-854d-e141de22dd9f" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:54.910 [INFO][3304] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" iface="eth0" netns="/var/run/netns/cni-f4777f31-96f2-2ff0-854d-e141de22dd9f" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:54.910 [INFO][3304] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:54.910 [INFO][3304] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.595 [INFO][3311] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.601 [INFO][3311] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.601 [INFO][3311] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.626 [WARNING][3311] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.628 [INFO][3311] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.632 [INFO][3311] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:55.638939 env[1249]: 2025-05-17 00:48:55.634 [INFO][3304] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:48:55.638939 env[1249]: time="2025-05-17T00:48:55.638574713Z" level=info msg="TearDown network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" successfully" May 17 00:48:55.638939 env[1249]: time="2025-05-17T00:48:55.638597890Z" level=info msg="StopPodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" returns successfully" May 17 00:48:55.637992 systemd[1]: run-netns-cni\x2df4777f31\x2d96f2\x2d2ff0\x2d854d\x2de141de22dd9f.mount: Deactivated successfully. May 17 00:48:55.705000 audit[3512]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:55.705000 audit[3512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe1419ea80 a2=0 a3=7ffe1419ea6c items=0 ppid=3346 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.705000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:55.712000 audit[3511]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:55.712000 audit[3511]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc5e5176e0 a2=0 a3=7ffc5e5176cc items=0 ppid=3346 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.712000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:55.713000 audit[3513]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3513 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:55.713000 audit[3513]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc0f0e5a20 a2=0 a3=7ffc0f0e5a0c items=0 ppid=3346 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.713000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:55.716000 audit[3510]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=3510 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:55.716000 audit[3510]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcdbb3d0f0 a2=0 a3=7ffcdbb3d0dc items=0 ppid=3346 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:55.716000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:55.775579 kubelet[2109]: I0517 00:48:55.775540 2109 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-ca-bundle\") pod \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\" (UID: \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\") " May 17 00:48:55.775814 kubelet[2109]: I0517 00:48:55.775612 2109 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vmltz\" (UniqueName: \"kubernetes.io/projected/0a140439-ab4b-4a0e-8c05-2786e62eccb3-kube-api-access-vmltz\") pod \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\" (UID: \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\") " May 17 00:48:55.775814 kubelet[2109]: I0517 00:48:55.775631 2109 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-backend-key-pair\") pod \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\" (UID: \"0a140439-ab4b-4a0e-8c05-2786e62eccb3\") " May 17 00:48:55.779239 systemd[1]: var-lib-kubelet-pods-0a140439\x2dab4b\x2d4a0e\x2d8c05\x2d2786e62eccb3-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:48:55.780149 kubelet[2109]: I0517 00:48:55.779840 2109 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "0a140439-ab4b-4a0e-8c05-2786e62eccb3" (UID: "0a140439-ab4b-4a0e-8c05-2786e62eccb3"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:48:55.780236 kubelet[2109]: I0517 00:48:55.775548 2109 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "0a140439-ab4b-4a0e-8c05-2786e62eccb3" (UID: "0a140439-ab4b-4a0e-8c05-2786e62eccb3"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:48:55.782253 systemd[1]: var-lib-kubelet-pods-0a140439\x2dab4b\x2d4a0e\x2d8c05\x2d2786e62eccb3-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvmltz.mount: Deactivated successfully. May 17 00:48:55.784689 kubelet[2109]: I0517 00:48:55.784676 2109 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0a140439-ab4b-4a0e-8c05-2786e62eccb3-kube-api-access-vmltz" (OuterVolumeSpecName: "kube-api-access-vmltz") pod "0a140439-ab4b-4a0e-8c05-2786e62eccb3" (UID: "0a140439-ab4b-4a0e-8c05-2786e62eccb3"). InnerVolumeSpecName "kube-api-access-vmltz". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:48:55.878004 kubelet[2109]: I0517 00:48:55.877934 2109 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-vmltz\" (UniqueName: \"kubernetes.io/projected/0a140439-ab4b-4a0e-8c05-2786e62eccb3-kube-api-access-vmltz\") on node \"localhost\" DevicePath \"\"" May 17 00:48:55.878251 kubelet[2109]: I0517 00:48:55.878241 2109 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 17 00:48:55.878415 kubelet[2109]: I0517 00:48:55.878376 2109 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a140439-ab4b-4a0e-8c05-2786e62eccb3-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 17 00:48:56.214106 systemd[1]: Removed slice kubepods-besteffort-pod0a140439_ab4b_4a0e_8c05_2786e62eccb3.slice. May 17 00:48:56.389658 systemd[1]: Created slice kubepods-besteffort-podc6a68569_1a40_4107_ae66_83c7bdb18e09.slice. May 17 00:48:56.482251 kubelet[2109]: I0517 00:48:56.482175 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwtm9\" (UniqueName: \"kubernetes.io/projected/c6a68569-1a40-4107-ae66-83c7bdb18e09-kube-api-access-fwtm9\") pod \"whisker-54dccb6fc9-mlvwj\" (UID: \"c6a68569-1a40-4107-ae66-83c7bdb18e09\") " pod="calico-system/whisker-54dccb6fc9-mlvwj" May 17 00:48:56.482480 kubelet[2109]: I0517 00:48:56.482461 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/c6a68569-1a40-4107-ae66-83c7bdb18e09-whisker-backend-key-pair\") pod \"whisker-54dccb6fc9-mlvwj\" (UID: \"c6a68569-1a40-4107-ae66-83c7bdb18e09\") " pod="calico-system/whisker-54dccb6fc9-mlvwj" May 17 00:48:56.482568 kubelet[2109]: I0517 00:48:56.482559 2109 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c6a68569-1a40-4107-ae66-83c7bdb18e09-whisker-ca-bundle\") pod \"whisker-54dccb6fc9-mlvwj\" (UID: \"c6a68569-1a40-4107-ae66-83c7bdb18e09\") " pod="calico-system/whisker-54dccb6fc9-mlvwj" May 17 00:48:56.694548 env[1249]: time="2025-05-17T00:48:56.694519086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-54dccb6fc9-mlvwj,Uid:c6a68569-1a40-4107-ae66-83c7bdb18e09,Namespace:calico-system,Attempt:0,}" May 17 00:48:56.788883 systemd-networkd[1065]: cali0b12dcaf46a: Link UP May 17 00:48:56.792044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:48:56.792101 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0b12dcaf46a: link becomes ready May 17 00:48:56.792179 systemd-networkd[1065]: cali0b12dcaf46a: Gained carrier May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.729 [INFO][3528] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0 whisker-54dccb6fc9- calico-system c6a68569-1a40-4107-ae66-83c7bdb18e09 872 0 2025-05-17 00:48:56 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:54dccb6fc9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-54dccb6fc9-mlvwj eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali0b12dcaf46a [] [] }} ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.729 [INFO][3528] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.750 [INFO][3540] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" HandleID="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Workload="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.751 [INFO][3540] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" HandleID="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Workload="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-54dccb6fc9-mlvwj", "timestamp":"2025-05-17 00:48:56.750488092 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.751 [INFO][3540] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.751 [INFO][3540] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.751 [INFO][3540] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.757 [INFO][3540] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.770 [INFO][3540] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.773 [INFO][3540] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.774 [INFO][3540] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.775 [INFO][3540] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.775 [INFO][3540] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.775 [INFO][3540] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93 May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.777 [INFO][3540] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.781 [INFO][3540] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.781 [INFO][3540] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" host="localhost" May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.781 [INFO][3540] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:56.804884 env[1249]: 2025-05-17 00:48:56.781 [INFO][3540] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" HandleID="k8s-pod-network.26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Workload="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.807338 env[1249]: 2025-05-17 00:48:56.783 [INFO][3528] cni-plugin/k8s.go 418: Populated endpoint ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0", GenerateName:"whisker-54dccb6fc9-", Namespace:"calico-system", SelfLink:"", UID:"c6a68569-1a40-4107-ae66-83c7bdb18e09", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"54dccb6fc9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-54dccb6fc9-mlvwj", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali0b12dcaf46a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:56.807338 env[1249]: 2025-05-17 00:48:56.783 [INFO][3528] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.807338 env[1249]: 2025-05-17 00:48:56.783 [INFO][3528] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0b12dcaf46a ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.807338 env[1249]: 2025-05-17 00:48:56.793 [INFO][3528] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.807338 env[1249]: 2025-05-17 00:48:56.793 [INFO][3528] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0", GenerateName:"whisker-54dccb6fc9-", Namespace:"calico-system", SelfLink:"", UID:"c6a68569-1a40-4107-ae66-83c7bdb18e09", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"54dccb6fc9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93", Pod:"whisker-54dccb6fc9-mlvwj", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali0b12dcaf46a", MAC:"ba:52:53:5d:81:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:56.807338 env[1249]: 2025-05-17 00:48:56.802 [INFO][3528] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93" Namespace="calico-system" Pod="whisker-54dccb6fc9-mlvwj" WorkloadEndpoint="localhost-k8s-whisker--54dccb6fc9--mlvwj-eth0" May 17 00:48:56.814805 env[1249]: time="2025-05-17T00:48:56.814768099Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:56.814918 env[1249]: time="2025-05-17T00:48:56.814791504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:56.814918 env[1249]: time="2025-05-17T00:48:56.814798770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:56.815003 env[1249]: time="2025-05-17T00:48:56.814927733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93 pid=3563 runtime=io.containerd.runc.v2 May 17 00:48:56.825266 systemd[1]: Started cri-containerd-26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93.scope. May 17 00:48:56.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit: BPF prog-id=161 op=LOAD May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3563 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:56.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383738646235643662333164663861623266623965626233623638 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3563 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:56.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383738646235643662333164663861623266623965626233623638 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit: BPF prog-id=162 op=LOAD May 17 00:48:56.834000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0000259a0 items=0 ppid=3563 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:56.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383738646235643662333164663861623266623965626233623638 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit: BPF prog-id=163 op=LOAD May 17 00:48:56.834000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0000259e8 items=0 ppid=3563 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:56.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383738646235643662333164663861623266623965626233623638 May 17 00:48:56.834000 audit: BPF prog-id=163 op=UNLOAD May 17 00:48:56.834000 audit: BPF prog-id=162 op=UNLOAD May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:56.834000 audit: BPF prog-id=164 op=LOAD May 17 00:48:56.834000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000025df8 items=0 ppid=3563 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:56.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383738646235643662333164663861623266623965626233623638 May 17 00:48:56.836664 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:48:56.824000 audit[3574]: NETFILTER_CFG table=filter:105 family=2 entries=59 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:56.824000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=35860 a0=3 a1=7ffd85c94af0 a2=0 a3=7ffd85c94adc items=0 ppid=3346 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:56.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:56.862187 env[1249]: time="2025-05-17T00:48:56.862159660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-54dccb6fc9-mlvwj,Uid:c6a68569-1a40-4107-ae66-83c7bdb18e09,Namespace:calico-system,Attempt:0,} returns sandbox id \"26878db5d6b31df8ab2fb9ebb3b68d3aebf029267434cd6205f7b3de8e2b4e93\"" May 17 00:48:56.863183 env[1249]: time="2025-05-17T00:48:56.863098031Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:48:57.100998 env[1249]: time="2025-05-17T00:48:57.100915895Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:57.102706 env[1249]: time="2025-05-17T00:48:57.102685264Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:57.105056 kubelet[2109]: E0517 00:48:57.105021 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:48:57.105294 kubelet[2109]: E0517 00:48:57.105282 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:48:57.109312 kubelet[2109]: E0517 00:48:57.109286 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:a8116c64fdfd443f9c4c53c8396e5d72,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fwtm9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54dccb6fc9-mlvwj_calico-system(c6a68569-1a40-4107-ae66-83c7bdb18e09): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:57.111445 env[1249]: time="2025-05-17T00:48:57.111427257Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:48:57.293644 systemd-networkd[1065]: vxlan.calico: Gained IPv6LL May 17 00:48:57.362559 env[1249]: time="2025-05-17T00:48:57.362470516Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:48:57.362965 env[1249]: time="2025-05-17T00:48:57.362924653Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:48:57.363092 kubelet[2109]: E0517 00:48:57.363055 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:48:57.363161 kubelet[2109]: E0517 00:48:57.363106 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:48:57.363897 kubelet[2109]: E0517 00:48:57.363194 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fwtm9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54dccb6fc9-mlvwj_calico-system(c6a68569-1a40-4107-ae66-83c7bdb18e09): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:48:57.364324 kubelet[2109]: E0517 00:48:57.364298 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54dccb6fc9-mlvwj" podUID="c6a68569-1a40-4107-ae66-83c7bdb18e09" May 17 00:48:58.125472 systemd-networkd[1065]: cali0b12dcaf46a: Gained IPv6LL May 17 00:48:58.192967 env[1249]: time="2025-05-17T00:48:58.192939669Z" level=info msg="StopPodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\"" May 17 00:48:58.193457 env[1249]: time="2025-05-17T00:48:58.192946490Z" level=info msg="StopPodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\"" May 17 00:48:58.193663 env[1249]: time="2025-05-17T00:48:58.192969921Z" level=info msg="StopPodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\"" May 17 00:48:58.194270 kubelet[2109]: I0517 00:48:58.194254 2109 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="0a140439-ab4b-4a0e-8c05-2786e62eccb3" path="/var/lib/kubelet/pods/0a140439-ab4b-4a0e-8c05-2786e62eccb3/volumes" May 17 00:48:58.311799 kubelet[2109]: E0517 00:48:58.311710 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54dccb6fc9-mlvwj" podUID="c6a68569-1a40-4107-ae66-83c7bdb18e09" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.293 [INFO][3634] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.293 [INFO][3634] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" iface="eth0" netns="/var/run/netns/cni-5e452c1a-7d9a-cbc2-2ca9-b386c41eeeb1" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.293 [INFO][3634] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" iface="eth0" netns="/var/run/netns/cni-5e452c1a-7d9a-cbc2-2ca9-b386c41eeeb1" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.293 [INFO][3634] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" iface="eth0" netns="/var/run/netns/cni-5e452c1a-7d9a-cbc2-2ca9-b386c41eeeb1" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.293 [INFO][3634] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.293 [INFO][3634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.332 [INFO][3658] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.332 [INFO][3658] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.469 [INFO][3658] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.479 [WARNING][3658] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.479 [INFO][3658] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.481 [INFO][3658] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:58.490489 env[1249]: 2025-05-17 00:48:58.482 [INFO][3634] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.245 [INFO][3629] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.246 [INFO][3629] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" iface="eth0" netns="/var/run/netns/cni-424c4be8-dfd1-4c52-0629-c730c551165f" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.246 [INFO][3629] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" iface="eth0" netns="/var/run/netns/cni-424c4be8-dfd1-4c52-0629-c730c551165f" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.246 [INFO][3629] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" iface="eth0" netns="/var/run/netns/cni-424c4be8-dfd1-4c52-0629-c730c551165f" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.246 [INFO][3629] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.246 [INFO][3629] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.332 [INFO][3649] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.332 [INFO][3649] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.332 [INFO][3649] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.467 [WARNING][3649] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.467 [INFO][3649] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.469 [INFO][3649] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:58.495556 env[1249]: 2025-05-17 00:48:58.479 [INFO][3629] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:48:58.495556 env[1249]: time="2025-05-17T00:48:58.493646755Z" level=info msg="TearDown network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" successfully" May 17 00:48:58.495556 env[1249]: time="2025-05-17T00:48:58.493668256Z" level=info msg="StopPodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" returns successfully" May 17 00:48:58.495556 env[1249]: time="2025-05-17T00:48:58.493781969Z" level=info msg="TearDown network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" successfully" May 17 00:48:58.495556 env[1249]: time="2025-05-17T00:48:58.493802238Z" level=info msg="StopPodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" returns successfully" May 17 00:48:58.495556 env[1249]: time="2025-05-17T00:48:58.494067710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nwqz5,Uid:29cd1609-7116-4876-aea6-bac14afee06d,Namespace:kube-system,Attempt:1,}" May 17 00:48:58.495556 env[1249]: time="2025-05-17T00:48:58.494315776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-wp585,Uid:58e37122-c913-439c-b4ab-707963c2e71f,Namespace:calico-apiserver,Attempt:1,}" May 17 00:48:58.492487 systemd[1]: run-netns-cni\x2d5e452c1a\x2d7d9a\x2dcbc2\x2d2ca9\x2db386c41eeeb1.mount: Deactivated successfully. May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.286 [INFO][3628] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.287 [INFO][3628] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" iface="eth0" netns="/var/run/netns/cni-624e6017-6b03-17ae-c9bc-c5b60d47fe28" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.287 [INFO][3628] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" iface="eth0" netns="/var/run/netns/cni-624e6017-6b03-17ae-c9bc-c5b60d47fe28" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.287 [INFO][3628] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" iface="eth0" netns="/var/run/netns/cni-624e6017-6b03-17ae-c9bc-c5b60d47fe28" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.287 [INFO][3628] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.287 [INFO][3628] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.337 [INFO][3656] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.337 [INFO][3656] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.482 [INFO][3656] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.496 [WARNING][3656] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.496 [INFO][3656] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.497 [INFO][3656] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:58.509882 env[1249]: 2025-05-17 00:48:58.498 [INFO][3628] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:48:58.509882 env[1249]: time="2025-05-17T00:48:58.501990629Z" level=info msg="TearDown network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" successfully" May 17 00:48:58.509882 env[1249]: time="2025-05-17T00:48:58.502011828Z" level=info msg="StopPodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" returns successfully" May 17 00:48:58.509882 env[1249]: time="2025-05-17T00:48:58.502491953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c588fdff4-cc4mr,Uid:347fd784-22c2-4e9c-b501-28fa3f1ab25c,Namespace:calico-system,Attempt:1,}" May 17 00:48:58.494840 systemd[1]: run-netns-cni\x2d424c4be8\x2ddfd1\x2d4c52\x2d0629\x2dc730c551165f.mount: Deactivated successfully. May 17 00:48:58.501660 systemd[1]: run-netns-cni\x2d624e6017\x2d6b03\x2d17ae\x2dc9bc\x2dc5b60d47fe28.mount: Deactivated successfully. May 17 00:48:58.627000 audit[3708]: NETFILTER_CFG table=filter:106 family=2 entries=20 op=nft_register_rule pid=3708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:58.627000 audit[3708]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffead62a1d0 a2=0 a3=7ffead62a1bc items=0 ppid=2248 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:58.632000 audit[3708]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:58.632000 audit[3708]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffead62a1d0 a2=0 a3=0 items=0 ppid=2248 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:58.682829 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:48:58.682930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif1fd992db73: link becomes ready May 17 00:48:58.681215 systemd-networkd[1065]: calif1fd992db73: Link UP May 17 00:48:58.682945 systemd-networkd[1065]: calif1fd992db73: Gained carrier May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.616 [INFO][3671] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0 coredns-668d6bf9bc- kube-system 29cd1609-7116-4876-aea6-bac14afee06d 890 0 2025-05-17 00:48:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-nwqz5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif1fd992db73 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.616 [INFO][3671] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.648 [INFO][3710] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" HandleID="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.648 [INFO][3710] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" HandleID="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1050), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-nwqz5", "timestamp":"2025-05-17 00:48:58.648231126 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.648 [INFO][3710] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.648 [INFO][3710] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.648 [INFO][3710] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.654 [INFO][3710] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.657 [INFO][3710] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.660 [INFO][3710] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.661 [INFO][3710] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.664 [INFO][3710] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.665 [INFO][3710] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.666 [INFO][3710] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395 May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.669 [INFO][3710] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.674 [INFO][3710] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.674 [INFO][3710] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" host="localhost" May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.674 [INFO][3710] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:58.694439 env[1249]: 2025-05-17 00:48:58.674 [INFO][3710] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" HandleID="k8s-pod-network.f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.695314 env[1249]: 2025-05-17 00:48:58.676 [INFO][3671] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29cd1609-7116-4876-aea6-bac14afee06d", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-nwqz5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1fd992db73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:58.695314 env[1249]: 2025-05-17 00:48:58.677 [INFO][3671] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.695314 env[1249]: 2025-05-17 00:48:58.677 [INFO][3671] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif1fd992db73 ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.695314 env[1249]: 2025-05-17 00:48:58.683 [INFO][3671] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.695314 env[1249]: 2025-05-17 00:48:58.683 [INFO][3671] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29cd1609-7116-4876-aea6-bac14afee06d", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395", Pod:"coredns-668d6bf9bc-nwqz5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1fd992db73", MAC:"0a:a7:e0:d1:a6:48", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:58.695314 env[1249]: 2025-05-17 00:48:58.692 [INFO][3671] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395" Namespace="kube-system" Pod="coredns-668d6bf9bc-nwqz5" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:48:58.708791 env[1249]: time="2025-05-17T00:48:58.708732788Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:58.709127 env[1249]: time="2025-05-17T00:48:58.709109877Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:58.711499 env[1249]: time="2025-05-17T00:48:58.711313166Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:58.712673 env[1249]: time="2025-05-17T00:48:58.712629639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395 pid=3745 runtime=io.containerd.runc.v2 May 17 00:48:58.725821 systemd[1]: run-containerd-runc-k8s.io-f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395-runc.HFKLFt.mount: Deactivated successfully. May 17 00:48:58.730051 systemd[1]: Started cri-containerd-f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395.scope. May 17 00:48:58.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit: BPF prog-id=165 op=LOAD May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3745 pid=3755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343065343765316262333065623362353637386364613633643130 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3745 pid=3755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343065343765316262333065623362353637386364613633643130 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit: BPF prog-id=166 op=LOAD May 17 00:48:58.740000 audit[3755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323a70 items=0 ppid=3745 pid=3755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343065343765316262333065623362353637386364613633643130 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit: BPF prog-id=167 op=LOAD May 17 00:48:58.740000 audit[3755]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323ab8 items=0 ppid=3745 pid=3755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343065343765316262333065623362353637386364613633643130 May 17 00:48:58.740000 audit: BPF prog-id=167 op=UNLOAD May 17 00:48:58.740000 audit: BPF prog-id=166 op=UNLOAD May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { perfmon } for pid=3755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit[3755]: AVC avc: denied { bpf } for pid=3755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.740000 audit: BPF prog-id=168 op=LOAD May 17 00:48:58.740000 audit[3755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323ec8 items=0 ppid=3745 pid=3755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343065343765316262333065623362353637386364613633643130 May 17 00:48:58.745539 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:48:58.764000 audit[3773]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:58.764000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7fffa0d30040 a2=0 a3=7fffa0d3002c items=0 ppid=3346 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.764000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:58.779169 env[1249]: time="2025-05-17T00:48:58.779144221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nwqz5,Uid:29cd1609-7116-4876-aea6-bac14afee06d,Namespace:kube-system,Attempt:1,} returns sandbox id \"f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395\"" May 17 00:48:58.784680 env[1249]: time="2025-05-17T00:48:58.784655440Z" level=info msg="CreateContainer within sandbox \"f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:48:58.792762 systemd-networkd[1065]: cali96f773dbc99: Link UP May 17 00:48:58.796111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali96f773dbc99: link becomes ready May 17 00:48:58.796536 systemd-networkd[1065]: cali96f773dbc99: Gained carrier May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.617 [INFO][3674] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0 calico-kube-controllers-6c588fdff4- calico-system 347fd784-22c2-4e9c-b501-28fa3f1ab25c 891 0 2025-05-17 00:48:34 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6c588fdff4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6c588fdff4-cc4mr eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali96f773dbc99 [] [] }} ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.617 [INFO][3674] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.666 [INFO][3716] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" HandleID="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.666 [INFO][3716] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" HandleID="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023cf70), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6c588fdff4-cc4mr", "timestamp":"2025-05-17 00:48:58.666640641 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.666 [INFO][3716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.674 [INFO][3716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.674 [INFO][3716] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.754 [INFO][3716] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.760 [INFO][3716] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.770 [INFO][3716] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.773 [INFO][3716] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.775 [INFO][3716] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.775 [INFO][3716] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.778 [INFO][3716] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.782 [INFO][3716] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.788 [INFO][3716] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.788 [INFO][3716] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" host="localhost" May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.788 [INFO][3716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:58.814839 env[1249]: 2025-05-17 00:48:58.789 [INFO][3716] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" HandleID="k8s-pod-network.e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.815654 env[1249]: 2025-05-17 00:48:58.790 [INFO][3674] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0", GenerateName:"calico-kube-controllers-6c588fdff4-", Namespace:"calico-system", SelfLink:"", UID:"347fd784-22c2-4e9c-b501-28fa3f1ab25c", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c588fdff4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6c588fdff4-cc4mr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali96f773dbc99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:58.815654 env[1249]: 2025-05-17 00:48:58.791 [INFO][3674] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.815654 env[1249]: 2025-05-17 00:48:58.791 [INFO][3674] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali96f773dbc99 ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.815654 env[1249]: 2025-05-17 00:48:58.793 [INFO][3674] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.815654 env[1249]: 2025-05-17 00:48:58.797 [INFO][3674] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0", GenerateName:"calico-kube-controllers-6c588fdff4-", Namespace:"calico-system", SelfLink:"", UID:"347fd784-22c2-4e9c-b501-28fa3f1ab25c", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c588fdff4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa", Pod:"calico-kube-controllers-6c588fdff4-cc4mr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali96f773dbc99", MAC:"ea:72:28:c6:20:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:58.815654 env[1249]: 2025-05-17 00:48:58.813 [INFO][3674] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa" Namespace="calico-system" Pod="calico-kube-controllers-6c588fdff4-cc4mr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:48:58.817397 env[1249]: time="2025-05-17T00:48:58.817370203Z" level=info msg="CreateContainer within sandbox \"f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7167fd50b1553a62f6defe01930240339519d2ce324557dddc93cd2ef21019d3\"" May 17 00:48:58.818012 env[1249]: time="2025-05-17T00:48:58.817991455Z" level=info msg="StartContainer for \"7167fd50b1553a62f6defe01930240339519d2ce324557dddc93cd2ef21019d3\"" May 17 00:48:58.827402 env[1249]: time="2025-05-17T00:48:58.827328662Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:58.827402 env[1249]: time="2025-05-17T00:48:58.827372861Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:58.828629 env[1249]: time="2025-05-17T00:48:58.827381111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:58.828629 env[1249]: time="2025-05-17T00:48:58.827744972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa pid=3802 runtime=io.containerd.runc.v2 May 17 00:48:58.839216 systemd[1]: Started cri-containerd-7167fd50b1553a62f6defe01930240339519d2ce324557dddc93cd2ef21019d3.scope. May 17 00:48:58.852506 systemd[1]: Started cri-containerd-e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa.scope. May 17 00:48:58.853000 audit[3817]: NETFILTER_CFG table=filter:109 family=2 entries=40 op=nft_register_chain pid=3817 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:58.853000 audit[3817]: SYSCALL arch=c000003e syscall=46 success=yes exit=20764 a0=3 a1=7fff871603a0 a2=0 a3=7fff8716038c items=0 ppid=3346 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit: BPF prog-id=169 op=LOAD May 17 00:48:58.863000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3745 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731363766643530623135353361363266366465666530313933303234 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3745 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731363766643530623135353361363266366465666530313933303234 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.863000 audit: BPF prog-id=170 op=LOAD May 17 00:48:58.863000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002ad7b0 items=0 ppid=3745 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731363766643530623135353361363266366465666530313933303234 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit: BPF prog-id=171 op=LOAD May 17 00:48:58.864000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002ad7f8 items=0 ppid=3745 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731363766643530623135353361363266366465666530313933303234 May 17 00:48:58.864000 audit: BPF prog-id=171 op=UNLOAD May 17 00:48:58.864000 audit: BPF prog-id=170 op=UNLOAD May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.864000 audit: BPF prog-id=172 op=LOAD May 17 00:48:58.864000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002adc08 items=0 ppid=3745 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731363766643530623135353361363266366465666530313933303234 May 17 00:48:58.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit: BPF prog-id=173 op=LOAD May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3802 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623631613835306335643430366132613535366233396133656565 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3802 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623631613835306335643430366132613535366233396133656565 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit: BPF prog-id=174 op=LOAD May 17 00:48:58.877000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cbce0 items=0 ppid=3802 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623631613835306335643430366132613535366233396133656565 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit: BPF prog-id=175 op=LOAD May 17 00:48:58.877000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cbd28 items=0 ppid=3802 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623631613835306335643430366132613535366233396133656565 May 17 00:48:58.877000 audit: BPF prog-id=175 op=UNLOAD May 17 00:48:58.877000 audit: BPF prog-id=174 op=UNLOAD May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:58.877000 audit: BPF prog-id=176 op=LOAD May 17 00:48:58.877000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034e138 items=0 ppid=3802 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623631613835306335643430366132613535366233396133656565 May 17 00:48:58.881460 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:48:58.895270 env[1249]: time="2025-05-17T00:48:58.895239872Z" level=info msg="StartContainer for \"7167fd50b1553a62f6defe01930240339519d2ce324557dddc93cd2ef21019d3\" returns successfully" May 17 00:48:58.906977 systemd-networkd[1065]: cali0507efa2f80: Link UP May 17 00:48:58.908662 systemd-networkd[1065]: cali0507efa2f80: Gained carrier May 17 00:48:58.909435 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0507efa2f80: link becomes ready May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.620 [INFO][3673] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0 calico-apiserver-9c77f996f- calico-apiserver 58e37122-c913-439c-b4ab-707963c2e71f 892 0 2025-05-17 00:48:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9c77f996f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-9c77f996f-wp585 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0507efa2f80 [] [] }} ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.620 [INFO][3673] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.700 [INFO][3718] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" HandleID="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.701 [INFO][3718] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" HandleID="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9660), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-9c77f996f-wp585", "timestamp":"2025-05-17 00:48:58.700928648 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.701 [INFO][3718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.789 [INFO][3718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.789 [INFO][3718] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.855 [INFO][3718] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.861 [INFO][3718] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.871 [INFO][3718] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.872 [INFO][3718] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.884 [INFO][3718] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.885 [INFO][3718] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.887 [INFO][3718] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4 May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.891 [INFO][3718] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.896 [INFO][3718] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.896 [INFO][3718] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" host="localhost" May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.897 [INFO][3718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:48:58.932896 env[1249]: 2025-05-17 00:48:58.897 [INFO][3718] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" HandleID="k8s-pod-network.274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.933567 env[1249]: 2025-05-17 00:48:58.898 [INFO][3673] cni-plugin/k8s.go 418: Populated endpoint ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"58e37122-c913-439c-b4ab-707963c2e71f", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-9c77f996f-wp585", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0507efa2f80", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:58.933567 env[1249]: 2025-05-17 00:48:58.898 [INFO][3673] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.933567 env[1249]: 2025-05-17 00:48:58.898 [INFO][3673] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0507efa2f80 ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.933567 env[1249]: 2025-05-17 00:48:58.907 [INFO][3673] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.933567 env[1249]: 2025-05-17 00:48:58.909 [INFO][3673] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"58e37122-c913-439c-b4ab-707963c2e71f", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4", Pod:"calico-apiserver-9c77f996f-wp585", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0507efa2f80", MAC:"8a:18:0e:a2:63:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:48:58.933567 env[1249]: 2025-05-17 00:48:58.931 [INFO][3673] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-wp585" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:48:58.936994 env[1249]: time="2025-05-17T00:48:58.936968538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c588fdff4-cc4mr,Uid:347fd784-22c2-4e9c-b501-28fa3f1ab25c,Namespace:calico-system,Attempt:1,} returns sandbox id \"e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa\"" May 17 00:48:58.944000 audit[3865]: NETFILTER_CFG table=filter:110 family=2 entries=64 op=nft_register_chain pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:48:58.944000 audit[3865]: SYSCALL arch=c000003e syscall=46 success=yes exit=33436 a0=3 a1=7ffdecebe550 a2=0 a3=7ffdecebe53c items=0 ppid=3346 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:58.944000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:48:58.959918 env[1249]: time="2025-05-17T00:48:58.959748472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:48:58.965942 env[1249]: time="2025-05-17T00:48:58.965889041Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:48:58.965942 env[1249]: time="2025-05-17T00:48:58.965920087Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:48:58.965942 env[1249]: time="2025-05-17T00:48:58.965928058Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:48:58.966182 env[1249]: time="2025-05-17T00:48:58.966155584Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4 pid=3876 runtime=io.containerd.runc.v2 May 17 00:48:58.980683 systemd[1]: Started cri-containerd-274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4.scope. May 17 00:48:59.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit: BPF prog-id=177 op=LOAD May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3876 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237346265636563646339393065663237666166663433653264643130 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3876 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237346265636563646339393065663237666166663433653264643130 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit: BPF prog-id=178 op=LOAD May 17 00:48:59.002000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028aaa0 items=0 ppid=3876 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237346265636563646339393065663237666166663433653264643130 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit: BPF prog-id=179 op=LOAD May 17 00:48:59.002000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028aae8 items=0 ppid=3876 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237346265636563646339393065663237666166663433653264643130 May 17 00:48:59.002000 audit: BPF prog-id=179 op=UNLOAD May 17 00:48:59.002000 audit: BPF prog-id=178 op=UNLOAD May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:48:59.002000 audit: BPF prog-id=180 op=LOAD May 17 00:48:59.002000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028aef8 items=0 ppid=3876 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237346265636563646339393065663237666166663433653264643130 May 17 00:48:59.009667 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:48:59.032673 env[1249]: time="2025-05-17T00:48:59.032648880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-wp585,Uid:58e37122-c913-439c-b4ab-707963c2e71f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4\"" May 17 00:48:59.167200 kubelet[2109]: I0517 00:48:59.167163 2109 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:48:59.245402 kernel: kauditd_printk_skb: 851 callbacks suppressed May 17 00:48:59.245492 kernel: audit: type=1400 audit(1747442939.240:1222): avc: denied { getattr } for pid=3829 comm="coredns" path="cgroup:[4026533066]" dev="nsfs" ino=4026533066 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c852 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:48:59.240000 audit[3829]: AVC avc: denied { getattr } for pid=3829 comm="coredns" path="cgroup:[4026533066]" dev="nsfs" ino=4026533066 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c852 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:48:59.251788 kernel: audit: type=1300 audit(1747442939.240:1222): arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4ed8 a3=0 items=0 ppid=3745 pid=3829 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c852 key=(null) May 17 00:48:59.251853 kernel: audit: type=1327 audit(1747442939.240:1222): proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:48:59.240000 audit[3829]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4ed8 a3=0 items=0 ppid=3745 pid=3829 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c852 key=(null) May 17 00:48:59.240000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:48:59.414000 audit[3953]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:59.414000 audit[3953]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc5e208500 a2=0 a3=7ffc5e2084ec items=0 ppid=2248 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.422633 kernel: audit: type=1325 audit(1747442939.414:1223): table=filter:111 family=2 entries=20 op=nft_register_rule pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:59.422720 kernel: audit: type=1300 audit(1747442939.414:1223): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc5e208500 a2=0 a3=7ffc5e2084ec items=0 ppid=2248 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.422742 kernel: audit: type=1327 audit(1747442939.414:1223): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:59.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:59.427000 audit[3953]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:59.431401 kernel: audit: type=1325 audit(1747442939.427:1224): table=nat:112 family=2 entries=14 op=nft_register_rule pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:48:59.427000 audit[3953]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc5e208500 a2=0 a3=0 items=0 ppid=2248 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:59.438915 kernel: audit: type=1300 audit(1747442939.427:1224): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc5e208500 a2=0 a3=0 items=0 ppid=2248 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:48:59.439016 kernel: audit: type=1327 audit(1747442939.427:1224): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:48:59.917529 systemd-networkd[1065]: calif1fd992db73: Gained IPv6LL May 17 00:49:00.197722 env[1249]: time="2025-05-17T00:49:00.197653288Z" level=info msg="StopPodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\"" May 17 00:49:00.205924 env[1249]: time="2025-05-17T00:49:00.205900378Z" level=info msg="StopPodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\"" May 17 00:49:00.237527 systemd-networkd[1065]: cali0507efa2f80: Gained IPv6LL May 17 00:49:00.303757 kubelet[2109]: I0517 00:49:00.299262 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-nwqz5" podStartSLOduration=38.291861565 podStartE2EDuration="38.291861565s" podCreationTimestamp="2025-05-17 00:48:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:48:59.394536785 +0000 UTC m=+43.405023595" watchObservedRunningTime="2025-05-17 00:49:00.291861565 +0000 UTC m=+44.302348369" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.292 [INFO][3975] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.292 [INFO][3975] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" iface="eth0" netns="/var/run/netns/cni-fd93e128-56bd-b079-80df-a03a1e8c28bd" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.292 [INFO][3975] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" iface="eth0" netns="/var/run/netns/cni-fd93e128-56bd-b079-80df-a03a1e8c28bd" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.293 [INFO][3975] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" iface="eth0" netns="/var/run/netns/cni-fd93e128-56bd-b079-80df-a03a1e8c28bd" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.293 [INFO][3975] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.293 [INFO][3975] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.341 [INFO][3988] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.341 [INFO][3988] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.341 [INFO][3988] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.347 [WARNING][3988] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.347 [INFO][3988] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.348 [INFO][3988] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:00.352075 env[1249]: 2025-05-17 00:49:00.350 [INFO][3975] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:00.354688 env[1249]: time="2025-05-17T00:49:00.354173118Z" level=info msg="TearDown network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" successfully" May 17 00:49:00.354688 env[1249]: time="2025-05-17T00:49:00.354195938Z" level=info msg="StopPodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" returns successfully" May 17 00:49:00.353689 systemd[1]: run-netns-cni\x2dfd93e128\x2d56bd\x2db079\x2d80df\x2da03a1e8c28bd.mount: Deactivated successfully. May 17 00:49:00.354993 env[1249]: time="2025-05-17T00:49:00.354792799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jd5qf,Uid:03278353-2b3c-4f49-8cf7-8e856b7ac899,Namespace:kube-system,Attempt:1,}" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.292 [INFO][3976] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.292 [INFO][3976] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" iface="eth0" netns="/var/run/netns/cni-efae18ef-dcfb-51cb-486f-296dc551a1ff" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.293 [INFO][3976] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" iface="eth0" netns="/var/run/netns/cni-efae18ef-dcfb-51cb-486f-296dc551a1ff" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.293 [INFO][3976] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" iface="eth0" netns="/var/run/netns/cni-efae18ef-dcfb-51cb-486f-296dc551a1ff" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.294 [INFO][3976] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.294 [INFO][3976] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.393 [INFO][3990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.393 [INFO][3990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.393 [INFO][3990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.399 [WARNING][3990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.399 [INFO][3990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.400 [INFO][3990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:00.402868 env[1249]: 2025-05-17 00:49:00.401 [INFO][3976] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:00.450644 env[1249]: time="2025-05-17T00:49:00.404919850Z" level=info msg="TearDown network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" successfully" May 17 00:49:00.450644 env[1249]: time="2025-05-17T00:49:00.404941162Z" level=info msg="StopPodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" returns successfully" May 17 00:49:00.450644 env[1249]: time="2025-05-17T00:49:00.405772373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-ks4xp,Uid:ef04eeb4-0013-414a-a9ac-8d69c29c2d59,Namespace:calico-apiserver,Attempt:1,}" May 17 00:49:00.404452 systemd[1]: run-netns-cni\x2defae18ef\x2ddcfb\x2d51cb\x2d486f\x2d296dc551a1ff.mount: Deactivated successfully. May 17 00:49:00.526000 audit[4002]: NETFILTER_CFG table=filter:113 family=2 entries=17 op=nft_register_rule pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:00.702475 kernel: audit: type=1325 audit(1747442940.526:1225): table=filter:113 family=2 entries=17 op=nft_register_rule pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:00.526000 audit[4002]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffee4bfdf0 a2=0 a3=7fffee4bfddc items=0 ppid=2248 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:00.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:00.538000 audit[4002]: NETFILTER_CFG table=nat:114 family=2 entries=35 op=nft_register_chain pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:00.538000 audit[4002]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffee4bfdf0 a2=0 a3=7fffee4bfddc items=0 ppid=2248 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:00.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:00.749524 systemd-networkd[1065]: cali96f773dbc99: Gained IPv6LL May 17 00:49:00.928845 systemd-networkd[1065]: calid18fc89a37d: Link UP May 17 00:49:00.931718 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:00.931791 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid18fc89a37d: link becomes ready May 17 00:49:00.931026 systemd-networkd[1065]: calid18fc89a37d: Gained carrier May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.839 [INFO][4009] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0 coredns-668d6bf9bc- kube-system 03278353-2b3c-4f49-8cf7-8e856b7ac899 928 0 2025-05-17 00:48:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-jd5qf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid18fc89a37d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.839 [INFO][4009] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.875 [INFO][4031] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" HandleID="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.875 [INFO][4031] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" HandleID="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-jd5qf", "timestamp":"2025-05-17 00:49:00.875633685 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.875 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.875 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.875 [INFO][4031] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.885 [INFO][4031] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.894 [INFO][4031] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.898 [INFO][4031] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.905 [INFO][4031] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.910 [INFO][4031] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.910 [INFO][4031] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.912 [INFO][4031] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880 May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.915 [INFO][4031] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.924 [INFO][4031] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.924 [INFO][4031] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" host="localhost" May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.924 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:00.956492 env[1249]: 2025-05-17 00:49:00.924 [INFO][4031] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" HandleID="k8s-pod-network.53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.977874 env[1249]: 2025-05-17 00:49:00.926 [INFO][4009] cni-plugin/k8s.go 418: Populated endpoint ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"03278353-2b3c-4f49-8cf7-8e856b7ac899", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-jd5qf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid18fc89a37d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:00.977874 env[1249]: 2025-05-17 00:49:00.926 [INFO][4009] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.977874 env[1249]: 2025-05-17 00:49:00.926 [INFO][4009] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid18fc89a37d ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.977874 env[1249]: 2025-05-17 00:49:00.932 [INFO][4009] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:00.977874 env[1249]: 2025-05-17 00:49:00.934 [INFO][4009] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"03278353-2b3c-4f49-8cf7-8e856b7ac899", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880", Pod:"coredns-668d6bf9bc-jd5qf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid18fc89a37d", MAC:"76:d2:ab:9b:bb:25", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:00.977874 env[1249]: 2025-05-17 00:49:00.955 [INFO][4009] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880" Namespace="kube-system" Pod="coredns-668d6bf9bc-jd5qf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:01.015000 audit[4063]: NETFILTER_CFG table=filter:115 family=2 entries=40 op=nft_register_chain pid=4063 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:01.015000 audit[4063]: SYSCALL arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7ffd58733a80 a2=0 a3=7ffd58733a6c items=0 ppid=3346 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.015000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:01.025697 env[1249]: time="2025-05-17T00:49:01.025648251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:01.026125 env[1249]: time="2025-05-17T00:49:01.025712697Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:01.026125 env[1249]: time="2025-05-17T00:49:01.025732199Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:01.026125 env[1249]: time="2025-05-17T00:49:01.025843348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880 pid=4062 runtime=io.containerd.runc.v2 May 17 00:49:01.073082 systemd[1]: Started cri-containerd-53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880.scope. May 17 00:49:01.087707 systemd-networkd[1065]: cali976767c0cb8: Link UP May 17 00:49:01.089715 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali976767c0cb8: link becomes ready May 17 00:49:01.089422 systemd-networkd[1065]: cali976767c0cb8: Gained carrier May 17 00:49:01.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.125000 audit: BPF prog-id=181 op=LOAD May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633730643135376637663735303933646235633766613263663665 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633730643135376637663735303933646235633766613263663665 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit: BPF prog-id=182 op=LOAD May 17 00:49:01.126000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038a0b0 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633730643135376637663735303933646235633766613263663665 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit: BPF prog-id=183 op=LOAD May 17 00:49:01.126000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038a0f8 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633730643135376637663735303933646235633766613263663665 May 17 00:49:01.126000 audit: BPF prog-id=183 op=UNLOAD May 17 00:49:01.126000 audit: BPF prog-id=182 op=UNLOAD May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.126000 audit: BPF prog-id=184 op=LOAD May 17 00:49:01.126000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038a508 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633730643135376637663735303933646235633766613263663665 May 17 00:49:01.138670 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.891 [INFO][4018] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0 calico-apiserver-9c77f996f- calico-apiserver ef04eeb4-0013-414a-a9ac-8d69c29c2d59 929 0 2025-05-17 00:48:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9c77f996f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-9c77f996f-ks4xp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali976767c0cb8 [] [] }} ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.891 [INFO][4018] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.958 [INFO][4039] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" HandleID="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.958 [INFO][4039] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" HandleID="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235a70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-9c77f996f-ks4xp", "timestamp":"2025-05-17 00:49:00.958694115 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.958 [INFO][4039] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.958 [INFO][4039] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.958 [INFO][4039] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:00.984 [INFO][4039] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.001 [INFO][4039] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.015 [INFO][4039] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.019 [INFO][4039] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.021 [INFO][4039] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.021 [INFO][4039] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.022 [INFO][4039] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.034 [INFO][4039] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.073 [INFO][4039] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.073 [INFO][4039] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" host="localhost" May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.073 [INFO][4039] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:01.171685 env[1249]: 2025-05-17 00:49:01.073 [INFO][4039] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" HandleID="k8s-pod-network.091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.177257 env[1249]: 2025-05-17 00:49:01.083 [INFO][4018] cni-plugin/k8s.go 418: Populated endpoint ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ef04eeb4-0013-414a-a9ac-8d69c29c2d59", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-9c77f996f-ks4xp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali976767c0cb8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:01.177257 env[1249]: 2025-05-17 00:49:01.084 [INFO][4018] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.177257 env[1249]: 2025-05-17 00:49:01.084 [INFO][4018] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali976767c0cb8 ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.177257 env[1249]: 2025-05-17 00:49:01.090 [INFO][4018] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.177257 env[1249]: 2025-05-17 00:49:01.090 [INFO][4018] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ef04eeb4-0013-414a-a9ac-8d69c29c2d59", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c", Pod:"calico-apiserver-9c77f996f-ks4xp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali976767c0cb8", MAC:"36:00:05:df:9d:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:01.177257 env[1249]: 2025-05-17 00:49:01.170 [INFO][4018] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c" Namespace="calico-apiserver" Pod="calico-apiserver-9c77f996f-ks4xp" WorkloadEndpoint="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:01.202600 env[1249]: time="2025-05-17T00:49:01.202351273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:01.202600 env[1249]: time="2025-05-17T00:49:01.202410537Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:01.202600 env[1249]: time="2025-05-17T00:49:01.202422545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:01.214380 env[1249]: time="2025-05-17T00:49:01.202896350Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c pid=4104 runtime=io.containerd.runc.v2 May 17 00:49:01.225904 systemd[1]: Started cri-containerd-091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c.scope. May 17 00:49:01.232391 env[1249]: time="2025-05-17T00:49:01.231890131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jd5qf,Uid:03278353-2b3c-4f49-8cf7-8e856b7ac899,Namespace:kube-system,Attempt:1,} returns sandbox id \"53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880\"" May 17 00:49:01.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit: BPF prog-id=185 op=LOAD May 17 00:49:01.249000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4104 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316138376264346133313532303534333031326434383030626239 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4104 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316138376264346133313532303534333031326434383030626239 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.249000 audit: BPF prog-id=186 op=LOAD May 17 00:49:01.249000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216660 items=0 ppid=4104 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316138376264346133313532303534333031326434383030626239 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit: BPF prog-id=187 op=LOAD May 17 00:49:01.250000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002166a8 items=0 ppid=4104 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316138376264346133313532303534333031326434383030626239 May 17 00:49:01.250000 audit: BPF prog-id=187 op=UNLOAD May 17 00:49:01.250000 audit: BPF prog-id=186 op=UNLOAD May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.250000 audit: BPF prog-id=188 op=LOAD May 17 00:49:01.250000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216ab8 items=0 ppid=4104 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316138376264346133313532303534333031326434383030626239 May 17 00:49:01.254000 audit[4137]: NETFILTER_CFG table=filter:116 family=2 entries=55 op=nft_register_chain pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:01.254000 audit[4137]: SYSCALL arch=c000003e syscall=46 success=yes exit=28288 a0=3 a1=7ffdb1f0da10 a2=0 a3=7ffdb1f0d9fc items=0 ppid=3346 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.254000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:01.253606 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:49:01.291808 env[1249]: time="2025-05-17T00:49:01.277786568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9c77f996f-ks4xp,Uid:ef04eeb4-0013-414a-a9ac-8d69c29c2d59,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c\"" May 17 00:49:01.477051 env[1249]: time="2025-05-17T00:49:01.476977352Z" level=info msg="StopPodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\"" May 17 00:49:01.649884 env[1249]: time="2025-05-17T00:49:01.649857742Z" level=info msg="CreateContainer within sandbox \"53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.594 [INFO][4153] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.594 [INFO][4153] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" iface="eth0" netns="/var/run/netns/cni-845f8797-28b8-a943-54df-2d301d4b7c84" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.594 [INFO][4153] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" iface="eth0" netns="/var/run/netns/cni-845f8797-28b8-a943-54df-2d301d4b7c84" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.594 [INFO][4153] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" iface="eth0" netns="/var/run/netns/cni-845f8797-28b8-a943-54df-2d301d4b7c84" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.594 [INFO][4153] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.594 [INFO][4153] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.632 [INFO][4160] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.632 [INFO][4160] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.632 [INFO][4160] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.646 [WARNING][4160] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.646 [INFO][4160] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.678 [INFO][4160] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:01.681206 env[1249]: 2025-05-17 00:49:01.679 [INFO][4153] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:01.682564 env[1249]: time="2025-05-17T00:49:01.681330561Z" level=info msg="TearDown network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" successfully" May 17 00:49:01.682564 env[1249]: time="2025-05-17T00:49:01.681354584Z" level=info msg="StopPodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" returns successfully" May 17 00:49:01.682564 env[1249]: time="2025-05-17T00:49:01.682165178Z" level=info msg="CreateContainer within sandbox \"53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f973167374c872949bb90aede734b73314c3dad2d8dee35f58cc07a54f966c44\"" May 17 00:49:01.691301 env[1249]: time="2025-05-17T00:49:01.691276386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-58zhp,Uid:1cb71b2a-3dd4-4752-90f5-3091de8ccd48,Namespace:calico-system,Attempt:1,}" May 17 00:49:01.698373 env[1249]: time="2025-05-17T00:49:01.697225069Z" level=info msg="StartContainer for \"f973167374c872949bb90aede734b73314c3dad2d8dee35f58cc07a54f966c44\"" May 17 00:49:01.768121 systemd[1]: Started cri-containerd-f973167374c872949bb90aede734b73314c3dad2d8dee35f58cc07a54f966c44.scope. May 17 00:49:01.812141 systemd[1]: run-containerd-runc-k8s.io-53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880-runc.ZHSLF0.mount: Deactivated successfully. May 17 00:49:01.812228 systemd[1]: run-netns-cni\x2d845f8797\x2d28b8\x2da943\x2d54df\x2d2d301d4b7c84.mount: Deactivated successfully. May 17 00:49:01.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit: BPF prog-id=189 op=LOAD May 17 00:49:01.843000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4062 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373331363733373463383732393439626239306165646537333462 May 17 00:49:01.843000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.843000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4062 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373331363733373463383732393439626239306165646537333462 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit: BPF prog-id=190 op=LOAD May 17 00:49:01.844000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021c770 items=0 ppid=4062 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373331363733373463383732393439626239306165646537333462 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit: BPF prog-id=191 op=LOAD May 17 00:49:01.844000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021c7b8 items=0 ppid=4062 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373331363733373463383732393439626239306165646537333462 May 17 00:49:01.844000 audit: BPF prog-id=191 op=UNLOAD May 17 00:49:01.844000 audit: BPF prog-id=190 op=UNLOAD May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:01.844000 audit: BPF prog-id=192 op=LOAD May 17 00:49:01.844000 audit[4179]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021cbc8 items=0 ppid=4062 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:01.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373331363733373463383732393439626239306165646537333462 May 17 00:49:01.877459 env[1249]: time="2025-05-17T00:49:01.877423340Z" level=info msg="StartContainer for \"f973167374c872949bb90aede734b73314c3dad2d8dee35f58cc07a54f966c44\" returns successfully" May 17 00:49:02.063485 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:49:02.063558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidfec644f53a: link becomes ready May 17 00:49:02.063051 systemd-networkd[1065]: calidfec644f53a: Link UP May 17 00:49:02.064986 systemd-networkd[1065]: calidfec644f53a: Gained carrier May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.795 [INFO][4174] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0 goldmane-78d55f7ddc- calico-system 1cb71b2a-3dd4-4752-90f5-3091de8ccd48 946 0 2025-05-17 00:48:33 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-78d55f7ddc-58zhp eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calidfec644f53a [] [] }} ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.795 [INFO][4174] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.884 [INFO][4201] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" HandleID="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.884 [INFO][4201] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" HandleID="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4c0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-78d55f7ddc-58zhp", "timestamp":"2025-05-17 00:49:01.884818621 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.884 [INFO][4201] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.884 [INFO][4201] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.884 [INFO][4201] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:01.893 [INFO][4201] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.005 [INFO][4201] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.011 [INFO][4201] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.014 [INFO][4201] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.015 [INFO][4201] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.015 [INFO][4201] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.016 [INFO][4201] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1 May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.030 [INFO][4201] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.051 [INFO][4201] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.051 [INFO][4201] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" host="localhost" May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.051 [INFO][4201] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:02.074120 env[1249]: 2025-05-17 00:49:02.051 [INFO][4201] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" HandleID="k8s-pod-network.d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.075011 env[1249]: 2025-05-17 00:49:02.053 [INFO][4174] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"1cb71b2a-3dd4-4752-90f5-3091de8ccd48", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-78d55f7ddc-58zhp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calidfec644f53a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:02.075011 env[1249]: 2025-05-17 00:49:02.054 [INFO][4174] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.075011 env[1249]: 2025-05-17 00:49:02.054 [INFO][4174] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidfec644f53a ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.075011 env[1249]: 2025-05-17 00:49:02.064 [INFO][4174] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.075011 env[1249]: 2025-05-17 00:49:02.065 [INFO][4174] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"1cb71b2a-3dd4-4752-90f5-3091de8ccd48", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1", Pod:"goldmane-78d55f7ddc-58zhp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calidfec644f53a", MAC:"fa:75:3c:82:f1:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:02.075011 env[1249]: 2025-05-17 00:49:02.072 [INFO][4174] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1" Namespace="calico-system" Pod="goldmane-78d55f7ddc-58zhp" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:02.117622 env[1249]: time="2025-05-17T00:49:02.117584504Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:02.120748 env[1249]: time="2025-05-17T00:49:02.117721614Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:02.120748 env[1249]: time="2025-05-17T00:49:02.117741539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:02.120748 env[1249]: time="2025-05-17T00:49:02.117845099Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1 pid=4230 runtime=io.containerd.runc.v2 May 17 00:49:02.160527 systemd[1]: Started cri-containerd-d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1.scope. May 17 00:49:02.164856 systemd[1]: run-containerd-runc-k8s.io-d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1-runc.EpMcLJ.mount: Deactivated successfully. May 17 00:49:02.168000 audit[4252]: NETFILTER_CFG table=filter:117 family=2 entries=62 op=nft_register_chain pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:02.168000 audit[4252]: SYSCALL arch=c000003e syscall=46 success=yes exit=31564 a0=3 a1=7ffc1bf95740 a2=0 a3=7ffc1bf9572c items=0 ppid=3346 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.168000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit: BPF prog-id=193 op=LOAD May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4230 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653964386237656162393062656365633536353136333661363836 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4230 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653964386237656162393062656365633536353136333661363836 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit: BPF prog-id=194 op=LOAD May 17 00:49:02.203000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000284f20 items=0 ppid=4230 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653964386237656162393062656365633536353136333661363836 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit: BPF prog-id=195 op=LOAD May 17 00:49:02.203000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000284f68 items=0 ppid=4230 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653964386237656162393062656365633536353136333661363836 May 17 00:49:02.203000 audit: BPF prog-id=195 op=UNLOAD May 17 00:49:02.203000 audit: BPF prog-id=194 op=UNLOAD May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.203000 audit: BPF prog-id=196 op=LOAD May 17 00:49:02.203000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000285378 items=0 ppid=4230 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653964386237656162393062656365633536353136333661363836 May 17 00:49:02.206006 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:49:02.246729 env[1249]: time="2025-05-17T00:49:02.246569723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-58zhp,Uid:1cb71b2a-3dd4-4752-90f5-3091de8ccd48,Namespace:calico-system,Attempt:1,} returns sandbox id \"d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1\"" May 17 00:49:02.302461 env[1249]: time="2025-05-17T00:49:02.302438062Z" level=info msg="StopPodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\"" May 17 00:49:02.334000 audit[4194]: AVC avc: denied { getattr } for pid=4194 comm="coredns" path="cgroup:[4026533091]" dev="nsfs" ino=4026533091 scontext=system_u:system_r:svirt_lxc_net_t:s0:c697,c951 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:49:02.334000 audit[4194]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a840 a2=c0004b4ed8 a3=0 items=0 ppid=4062 pid=4194 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c697,c951 key=(null) May 17 00:49:02.334000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.429 [INFO][4277] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.429 [INFO][4277] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" iface="eth0" netns="/var/run/netns/cni-85acc5fe-82be-20e7-1645-db0628e57327" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.429 [INFO][4277] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" iface="eth0" netns="/var/run/netns/cni-85acc5fe-82be-20e7-1645-db0628e57327" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.429 [INFO][4277] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" iface="eth0" netns="/var/run/netns/cni-85acc5fe-82be-20e7-1645-db0628e57327" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.429 [INFO][4277] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.429 [INFO][4277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.461 [INFO][4287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.461 [INFO][4287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.461 [INFO][4287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.503 [WARNING][4287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.503 [INFO][4287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.505 [INFO][4287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:02.507721 env[1249]: 2025-05-17 00:49:02.506 [INFO][4277] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:02.517554 env[1249]: time="2025-05-17T00:49:02.508024789Z" level=info msg="TearDown network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" successfully" May 17 00:49:02.517554 env[1249]: time="2025-05-17T00:49:02.508046366Z" level=info msg="StopPodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" returns successfully" May 17 00:49:02.542470 systemd-networkd[1065]: calid18fc89a37d: Gained IPv6LL May 17 00:49:02.549374 env[1249]: time="2025-05-17T00:49:02.549345300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xpczn,Uid:cd10f665-ce0e-4c29-b06e-afa77ff31d8a,Namespace:calico-system,Attempt:1,}" May 17 00:49:02.697265 kubelet[2109]: I0517 00:49:02.683064 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-jd5qf" podStartSLOduration=40.659841647 podStartE2EDuration="40.659841647s" podCreationTimestamp="2025-05-17 00:48:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:49:02.657541638 +0000 UTC m=+46.668028443" watchObservedRunningTime="2025-05-17 00:49:02.659841647 +0000 UTC m=+46.670328451" May 17 00:49:02.784583 systemd-networkd[1065]: calia34d57c202b: Link UP May 17 00:49:02.786656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia34d57c202b: link becomes ready May 17 00:49:02.786434 systemd-networkd[1065]: calia34d57c202b: Gained carrier May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.621 [INFO][4293] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--xpczn-eth0 csi-node-driver- calico-system cd10f665-ce0e-4c29-b06e-afa77ff31d8a 955 0 2025-05-17 00:48:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-xpczn eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia34d57c202b [] [] }} ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.622 [INFO][4293] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.677 [INFO][4305] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" HandleID="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.677 [INFO][4305] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" HandleID="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9630), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-xpczn", "timestamp":"2025-05-17 00:49:02.677013895 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.677 [INFO][4305] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.677 [INFO][4305] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.677 [INFO][4305] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.686 [INFO][4305] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.699 [INFO][4305] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.709 [INFO][4305] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.716 [INFO][4305] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.727 [INFO][4305] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.727 [INFO][4305] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.761 [INFO][4305] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.770 [INFO][4305] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.779 [INFO][4305] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.779 [INFO][4305] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" host="localhost" May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.779 [INFO][4305] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:02.808454 env[1249]: 2025-05-17 00:49:02.779 [INFO][4305] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" HandleID="k8s-pod-network.b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.888494 env[1249]: 2025-05-17 00:49:02.781 [INFO][4293] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xpczn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cd10f665-ce0e-4c29-b06e-afa77ff31d8a", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-xpczn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia34d57c202b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:02.888494 env[1249]: 2025-05-17 00:49:02.781 [INFO][4293] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.888494 env[1249]: 2025-05-17 00:49:02.781 [INFO][4293] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia34d57c202b ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.888494 env[1249]: 2025-05-17 00:49:02.784 [INFO][4293] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.888494 env[1249]: 2025-05-17 00:49:02.785 [INFO][4293] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xpczn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cd10f665-ce0e-4c29-b06e-afa77ff31d8a", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d", Pod:"csi-node-driver-xpczn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia34d57c202b", MAC:"ea:d5:28:55:39:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:02.888494 env[1249]: 2025-05-17 00:49:02.805 [INFO][4293] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d" Namespace="calico-system" Pod="csi-node-driver-xpczn" WorkloadEndpoint="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:02.888494 env[1249]: time="2025-05-17T00:49:02.854458002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:49:02.888494 env[1249]: time="2025-05-17T00:49:02.854482007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:49:02.888494 env[1249]: time="2025-05-17T00:49:02.854489355Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:49:02.888494 env[1249]: time="2025-05-17T00:49:02.854585131Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d pid=4326 runtime=io.containerd.runc.v2 May 17 00:49:02.811709 systemd[1]: run-netns-cni\x2d85acc5fe\x2d82be\x2d20e7\x2d1645\x2ddb0628e57327.mount: Deactivated successfully. May 17 00:49:02.875251 systemd[1]: Started cri-containerd-b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d.scope. May 17 00:49:02.881166 systemd[1]: run-containerd-runc-k8s.io-b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d-runc.WRMhzB.mount: Deactivated successfully. May 17 00:49:02.925495 systemd-networkd[1065]: cali976767c0cb8: Gained IPv6LL May 17 00:49:02.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.932000 audit: BPF prog-id=197 op=LOAD May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4326 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313736326438353438623366623862623639386339303165383337 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4326 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313736326438353438623366623862623639386339303165383337 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit: BPF prog-id=198 op=LOAD May 17 00:49:02.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283930 items=0 ppid=4326 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313736326438353438623366623862623639386339303165383337 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit: BPF prog-id=199 op=LOAD May 17 00:49:02.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000283978 items=0 ppid=4326 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313736326438353438623366623862623639386339303165383337 May 17 00:49:02.933000 audit: BPF prog-id=199 op=UNLOAD May 17 00:49:02.933000 audit: BPF prog-id=198 op=UNLOAD May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:02.933000 audit: BPF prog-id=200 op=LOAD May 17 00:49:02.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000283d88 items=0 ppid=4326 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:02.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313736326438353438623366623862623639386339303165383337 May 17 00:49:02.962852 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:49:02.995033 env[1249]: time="2025-05-17T00:49:02.995008109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xpczn,Uid:cd10f665-ce0e-4c29-b06e-afa77ff31d8a,Namespace:calico-system,Attempt:1,} returns sandbox id \"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d\"" May 17 00:49:03.168582 env[1249]: time="2025-05-17T00:49:03.168541907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:03.171407 env[1249]: time="2025-05-17T00:49:03.171370974Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:03.172136 env[1249]: time="2025-05-17T00:49:03.171681252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:49:03.172136 env[1249]: time="2025-05-17T00:49:03.171997263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:03.172566 env[1249]: time="2025-05-17T00:49:03.172341250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:03.197811 env[1249]: time="2025-05-17T00:49:03.197780984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:49:03.216000 audit[4363]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=4363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:03.216000 audit[4363]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd6bfc4c00 a2=0 a3=7ffd6bfc4bec items=0 ppid=2248 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:03.219570 env[1249]: time="2025-05-17T00:49:03.219546265Z" level=info msg="CreateContainer within sandbox \"e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:49:03.230000 audit[4365]: NETFILTER_CFG table=filter:119 family=2 entries=48 op=nft_register_chain pid=4365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:49:03.230000 audit[4365]: SYSCALL arch=c000003e syscall=46 success=yes exit=23092 a0=3 a1=7fff34d46780 a2=0 a3=7fff34d4676c items=0 ppid=3346 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.230000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:49:03.244824 env[1249]: time="2025-05-17T00:49:03.233834374Z" level=info msg="CreateContainer within sandbox \"e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"6930970a78bff0bfe396b9a55d6e474fe5b367cc98990ad2c5cf001d0edc0190\"" May 17 00:49:03.246097 env[1249]: time="2025-05-17T00:49:03.245417674Z" level=info msg="StartContainer for \"6930970a78bff0bfe396b9a55d6e474fe5b367cc98990ad2c5cf001d0edc0190\"" May 17 00:49:03.259768 systemd[1]: Started cri-containerd-6930970a78bff0bfe396b9a55d6e474fe5b367cc98990ad2c5cf001d0edc0190.scope. May 17 00:49:03.303000 audit[4363]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:03.303000 audit[4363]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd6bfc4c00 a2=0 a3=7ffd6bfc4bec items=0 ppid=2248 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:03.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit: BPF prog-id=201 op=LOAD May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3802 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333039373061373862666630626665333936623961353564366534 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3802 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333039373061373862666630626665333936623961353564366534 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit: BPF prog-id=202 op=LOAD May 17 00:49:03.308000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c5df0 items=0 ppid=3802 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333039373061373862666630626665333936623961353564366534 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit: BPF prog-id=203 op=LOAD May 17 00:49:03.308000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c5e38 items=0 ppid=3802 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333039373061373862666630626665333936623961353564366534 May 17 00:49:03.308000 audit: BPF prog-id=203 op=UNLOAD May 17 00:49:03.308000 audit: BPF prog-id=202 op=UNLOAD May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:03.308000 audit: BPF prog-id=204 op=LOAD May 17 00:49:03.308000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4248 items=0 ppid=3802 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333039373061373862666630626665333936623961353564366534 May 17 00:49:03.332097 env[1249]: time="2025-05-17T00:49:03.332062967Z" level=info msg="StartContainer for \"6930970a78bff0bfe396b9a55d6e474fe5b367cc98990ad2c5cf001d0edc0190\" returns successfully" May 17 00:49:03.353000 audit[4405]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:03.353000 audit[4405]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcdfe22870 a2=0 a3=7ffcdfe2285c items=0 ppid=2248 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:03.357000 audit[4405]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:03.357000 audit[4405]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcdfe22870 a2=0 a3=7ffcdfe2285c items=0 ppid=2248 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:03.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:03.373473 systemd-networkd[1065]: calidfec644f53a: Gained IPv6LL May 17 00:49:03.711624 kubelet[2109]: I0517 00:49:03.711594 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6c588fdff4-cc4mr" podStartSLOduration=25.493131786 podStartE2EDuration="29.711580439s" podCreationTimestamp="2025-05-17 00:48:34 +0000 UTC" firstStartedPulling="2025-05-17 00:48:58.959477783 +0000 UTC m=+42.969964586" lastFinishedPulling="2025-05-17 00:49:03.177926439 +0000 UTC m=+47.188413239" observedRunningTime="2025-05-17 00:49:03.711221584 +0000 UTC m=+47.721708393" watchObservedRunningTime="2025-05-17 00:49:03.711580439 +0000 UTC m=+47.722067242" May 17 00:49:04.141543 systemd-networkd[1065]: calia34d57c202b: Gained IPv6LL May 17 00:49:04.738850 systemd[1]: run-containerd-runc-k8s.io-6930970a78bff0bfe396b9a55d6e474fe5b367cc98990ad2c5cf001d0edc0190-runc.SqWF1S.mount: Deactivated successfully. May 17 00:49:06.587561 env[1249]: time="2025-05-17T00:49:06.587520725Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.601689 env[1249]: time="2025-05-17T00:49:06.589967588Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.601689 env[1249]: time="2025-05-17T00:49:06.591089920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.601689 env[1249]: time="2025-05-17T00:49:06.591729776Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.601689 env[1249]: time="2025-05-17T00:49:06.592015589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:49:06.660432 env[1249]: time="2025-05-17T00:49:06.660404460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:49:06.679252 env[1249]: time="2025-05-17T00:49:06.679172483Z" level=info msg="CreateContainer within sandbox \"274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:49:06.695073 env[1249]: time="2025-05-17T00:49:06.695032491Z" level=info msg="CreateContainer within sandbox \"274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6c8a61b51a1f06148257b9f5fb603493e7755dcddc6e3d1b471dff8a477363b6\"" May 17 00:49:06.699325 env[1249]: time="2025-05-17T00:49:06.699298677Z" level=info msg="StartContainer for \"6c8a61b51a1f06148257b9f5fb603493e7755dcddc6e3d1b471dff8a477363b6\"" May 17 00:49:06.740784 systemd[1]: Started cri-containerd-6c8a61b51a1f06148257b9f5fb603493e7755dcddc6e3d1b471dff8a477363b6.scope. May 17 00:49:06.756410 kernel: kauditd_printk_skb: 374 callbacks suppressed May 17 00:49:06.759281 kernel: audit: type=1400 audit(1747442946.752:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.766553 kernel: audit: type=1400 audit(1747442946.752:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.769807 kernel: audit: type=1400 audit(1747442946.752:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.769865 kernel: audit: type=1400 audit(1747442946.752:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.769882 kernel: audit: type=1400 audit(1747442946.752:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.817638 kernel: audit: type=1400 audit(1747442946.752:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.817703 kernel: audit: type=1400 audit(1747442946.752:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.818202 kernel: audit: type=1400 audit(1747442946.752:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.818618 kernel: audit: type=1400 audit(1747442946.752:1352): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.819212 kernel: audit: type=1400 audit(1747442946.755:1353): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.755000 audit: BPF prog-id=205 op=LOAD May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3876 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663386136316235316131663036313438323537623966356662363033 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3876 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663386136316235316131663036313438323537623966356662363033 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit: BPF prog-id=206 op=LOAD May 17 00:49:06.758000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a1d30 items=0 ppid=3876 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663386136316235316131663036313438323537623966356662363033 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit: BPF prog-id=207 op=LOAD May 17 00:49:06.758000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a1d78 items=0 ppid=3876 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663386136316235316131663036313438323537623966356662363033 May 17 00:49:06.758000 audit: BPF prog-id=207 op=UNLOAD May 17 00:49:06.758000 audit: BPF prog-id=206 op=UNLOAD May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { perfmon } for pid=4446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit[4446]: AVC avc: denied { bpf } for pid=4446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:06.758000 audit: BPF prog-id=208 op=LOAD May 17 00:49:06.758000 audit[4446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ee188 items=0 ppid=3876 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663386136316235316131663036313438323537623966356662363033 May 17 00:49:06.827300 env[1249]: time="2025-05-17T00:49:06.812162600Z" level=info msg="StartContainer for \"6c8a61b51a1f06148257b9f5fb603493e7755dcddc6e3d1b471dff8a477363b6\" returns successfully" May 17 00:49:06.980224 env[1249]: time="2025-05-17T00:49:06.980201710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.983707 env[1249]: time="2025-05-17T00:49:06.983690556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.984860 env[1249]: time="2025-05-17T00:49:06.984847486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.986462 env[1249]: time="2025-05-17T00:49:06.986448713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:06.986839 env[1249]: time="2025-05-17T00:49:06.986826395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:49:06.987786 env[1249]: time="2025-05-17T00:49:06.987774576Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:06.989658 env[1249]: time="2025-05-17T00:49:06.989631194Z" level=info msg="CreateContainer within sandbox \"091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:49:07.012017 env[1249]: time="2025-05-17T00:49:07.011984760Z" level=info msg="CreateContainer within sandbox \"091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8a72d5f81269072ea1b8550b0b37ceba57820d9e07b59be990f2b7dd85936635\"" May 17 00:49:07.013992 env[1249]: time="2025-05-17T00:49:07.013969562Z" level=info msg="StartContainer for \"8a72d5f81269072ea1b8550b0b37ceba57820d9e07b59be990f2b7dd85936635\"" May 17 00:49:07.031462 systemd[1]: Started cri-containerd-8a72d5f81269072ea1b8550b0b37ceba57820d9e07b59be990f2b7dd85936635.scope. May 17 00:49:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.059000 audit: BPF prog-id=209 op=LOAD May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4104 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373264356638313236393037326561316238353530623062333763 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4104 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373264356638313236393037326561316238353530623062333763 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit: BPF prog-id=210 op=LOAD May 17 00:49:07.060000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000261ec0 items=0 ppid=4104 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373264356638313236393037326561316238353530623062333763 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit: BPF prog-id=211 op=LOAD May 17 00:49:07.060000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000261f08 items=0 ppid=4104 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373264356638313236393037326561316238353530623062333763 May 17 00:49:07.060000 audit: BPF prog-id=211 op=UNLOAD May 17 00:49:07.060000 audit: BPF prog-id=210 op=UNLOAD May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:07.060000 audit: BPF prog-id=212 op=LOAD May 17 00:49:07.060000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ce318 items=0 ppid=4104 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373264356638313236393037326561316238353530623062333763 May 17 00:49:07.088682 env[1249]: time="2025-05-17T00:49:07.088652449Z" level=info msg="StartContainer for \"8a72d5f81269072ea1b8550b0b37ceba57820d9e07b59be990f2b7dd85936635\" returns successfully" May 17 00:49:07.152000 audit[4514]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:07.152000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd331b44f0 a2=0 a3=7ffd331b44dc items=0 ppid=2248 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:07.159000 audit[4514]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:07.159000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd331b44f0 a2=0 a3=7ffd331b44dc items=0 ppid=2248 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:07.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:07.231880 env[1249]: time="2025-05-17T00:49:07.231807798Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:07.233702 env[1249]: time="2025-05-17T00:49:07.233682026Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:07.236809 kubelet[2109]: E0517 00:49:07.236775 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:07.237784 kubelet[2109]: E0517 00:49:07.237757 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:07.238067 env[1249]: time="2025-05-17T00:49:07.238052585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:49:07.279020 kubelet[2109]: E0517 00:49:07.278977 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fnssx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-58zhp_calico-system(1cb71b2a-3dd4-4752-90f5-3091de8ccd48): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:07.281686 kubelet[2109]: E0517 00:49:07.280398 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-58zhp" podUID="1cb71b2a-3dd4-4752-90f5-3091de8ccd48" May 17 00:49:07.936578 kubelet[2109]: E0517 00:49:07.936556 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-58zhp" podUID="1cb71b2a-3dd4-4752-90f5-3091de8ccd48" May 17 00:49:07.951097 kubelet[2109]: I0517 00:49:07.951073 2109 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:08.158000 audit[4516]: NETFILTER_CFG table=filter:125 family=2 entries=14 op=nft_register_rule pid=4516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:08.158000 audit[4516]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe5ad982c0 a2=0 a3=7ffe5ad982ac items=0 ppid=2248 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:08.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:08.162000 audit[4516]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:08.162000 audit[4516]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe5ad982c0 a2=0 a3=7ffe5ad982ac items=0 ppid=2248 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:08.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:08.172000 audit[4518]: NETFILTER_CFG table=filter:127 family=2 entries=14 op=nft_register_rule pid=4518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:08.172000 audit[4518]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd0125e2b0 a2=0 a3=7ffd0125e29c items=0 ppid=2248 pid=4518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:08.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:08.177000 audit[4518]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=4518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:08.177000 audit[4518]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd0125e2b0 a2=0 a3=7ffd0125e29c items=0 ppid=2248 pid=4518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:08.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:08.272912 kubelet[2109]: I0517 00:49:08.147825 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9c77f996f-wp585" podStartSLOduration=29.487201154 podStartE2EDuration="37.074044173s" podCreationTimestamp="2025-05-17 00:48:31 +0000 UTC" firstStartedPulling="2025-05-17 00:48:59.0335491 +0000 UTC m=+43.044035897" lastFinishedPulling="2025-05-17 00:49:06.620392115 +0000 UTC m=+50.630878916" observedRunningTime="2025-05-17 00:49:06.883032315 +0000 UTC m=+50.893519124" watchObservedRunningTime="2025-05-17 00:49:08.074044173 +0000 UTC m=+52.084530982" May 17 00:49:08.705000 audit[4456]: AVC avc: denied { watch } for pid=4456 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.3733347298/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c497,c708 tclass=file permissive=0 May 17 00:49:08.705000 audit[4456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001518720 a2=fc6 a3=0 items=0 ppid=3876 pid=4456 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 key=(null) May 17 00:49:08.705000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:08.892000 audit[4494]: AVC avc: denied { watch } for pid=4494 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.2678725883/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c181,c733 tclass=file permissive=0 May 17 00:49:08.892000 audit[4494]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007bba80 a2=fc6 a3=0 items=0 ppid=4104 pid=4494 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 key=(null) May 17 00:49:08.892000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:49:09.029218 kubelet[2109]: I0517 00:49:09.029152 2109 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:09.276716 env[1249]: time="2025-05-17T00:49:09.276680016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.281009 env[1249]: time="2025-05-17T00:49:09.278207257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.281009 env[1249]: time="2025-05-17T00:49:09.279399092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.281009 env[1249]: time="2025-05-17T00:49:09.280671687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:49:09.281276 env[1249]: time="2025-05-17T00:49:09.281215364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:09.285464 env[1249]: time="2025-05-17T00:49:09.285438188Z" level=info msg="CreateContainer within sandbox \"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:49:09.304162 env[1249]: time="2025-05-17T00:49:09.304136507Z" level=info msg="CreateContainer within sandbox \"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fc77bf10cabf651fe82162a7b713047417c009a72b69ddf21027c3acce2e7a49\"" May 17 00:49:09.304857 env[1249]: time="2025-05-17T00:49:09.304841976Z" level=info msg="StartContainer for \"fc77bf10cabf651fe82162a7b713047417c009a72b69ddf21027c3acce2e7a49\"" May 17 00:49:09.341942 systemd[1]: Started cri-containerd-fc77bf10cabf651fe82162a7b713047417c009a72b69ddf21027c3acce2e7a49.scope. May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f21f8486cb8 items=0 ppid=4326 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373762663130636162663635316665383231363261376237313330 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit: BPF prog-id=213 op=LOAD May 17 00:49:09.359000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001fe1b8 items=0 ppid=4326 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373762663130636162663635316665383231363261376237313330 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit: BPF prog-id=214 op=LOAD May 17 00:49:09.359000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001fe208 items=0 ppid=4326 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373762663130636162663635316665383231363261376237313330 May 17 00:49:09.359000 audit: BPF prog-id=214 op=UNLOAD May 17 00:49:09.359000 audit: BPF prog-id=213 op=UNLOAD May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:09.359000 audit: BPF prog-id=215 op=LOAD May 17 00:49:09.359000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001fe298 items=0 ppid=4326 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373762663130636162663635316665383231363261376237313330 May 17 00:49:09.459477 env[1249]: time="2025-05-17T00:49:09.459445131Z" level=info msg="StartContainer for \"fc77bf10cabf651fe82162a7b713047417c009a72b69ddf21027c3acce2e7a49\" returns successfully" May 17 00:49:09.532366 env[1249]: time="2025-05-17T00:49:09.532299396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:49:11.735000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:11.735000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:11.735000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c8c760 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:49:11.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:11.735000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028e4f60 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:49:11.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:12.545000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.546749 kernel: kauditd_printk_skb: 177 callbacks suppressed May 17 00:49:12.553612 kernel: audit: type=1400 audit(1747442952.545:1396): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.568675 kernel: audit: type=1300 audit(1747442952.545:1396): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c006e8c000 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.578599 kernel: audit: type=1327 audit(1747442952.545:1396): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.586504 kernel: audit: type=1400 audit(1747442952.570:1397): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.586534 kernel: audit: type=1300 audit(1747442952.570:1397): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00a374000 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.586553 kernel: audit: type=1327 audit(1747442952.570:1397): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.545000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c006e8c000 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.570000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.570000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00a374000 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.570000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.629000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.643085 kernel: audit: type=1400 audit(1747442952.629:1398): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.643120 kernel: audit: type=1300 audit(1747442952.629:1398): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c010421e60 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.652544 kernel: audit: type=1327 audit(1747442952.629:1398): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.660219 kernel: audit: type=1400 audit(1747442952.652:1399): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.629000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c010421e60 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.629000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.652000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.652000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c009417d80 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.652000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.674000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.674000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010421e90 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:12.686000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:12.686000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010421ec0 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:49:12.686000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:49:13.002445 env[1249]: time="2025-05-17T00:49:13.002409596Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:13.035587 env[1249]: time="2025-05-17T00:49:13.035558391Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:13.044660 env[1249]: time="2025-05-17T00:49:13.044638117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:13.046621 env[1249]: time="2025-05-17T00:49:13.046595724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:49:13.046813 env[1249]: time="2025-05-17T00:49:13.046764088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:49:13.048472 env[1249]: time="2025-05-17T00:49:13.048454542Z" level=info msg="CreateContainer within sandbox \"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:49:13.071125 env[1249]: time="2025-05-17T00:49:13.071099954Z" level=info msg="CreateContainer within sandbox \"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e243fe29c013c8343e6b65bc2a3e7f4e82ff342a55a409a3515aabb728af1521\"" May 17 00:49:13.071570 env[1249]: time="2025-05-17T00:49:13.071553299Z" level=info msg="StartContainer for \"e243fe29c013c8343e6b65bc2a3e7f4e82ff342a55a409a3515aabb728af1521\"" May 17 00:49:13.087551 systemd[1]: Started cri-containerd-e243fe29c013c8343e6b65bc2a3e7f4e82ff342a55a409a3515aabb728af1521.scope. May 17 00:49:13.094384 systemd[1]: run-containerd-runc-k8s.io-e243fe29c013c8343e6b65bc2a3e7f4e82ff342a55a409a3515aabb728af1521-runc.gIF1Cq.mount: Deactivated successfully. May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe94439a648 items=0 ppid=4326 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:13.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343366653239633031336338333433653662363562633261336537 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit: BPF prog-id=216 op=LOAD May 17 00:49:13.110000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000386608 items=0 ppid=4326 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:13.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343366653239633031336338333433653662363562633261336537 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit: BPF prog-id=217 op=LOAD May 17 00:49:13.110000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000386658 items=0 ppid=4326 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:13.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343366653239633031336338333433653662363562633261336537 May 17 00:49:13.110000 audit: BPF prog-id=217 op=UNLOAD May 17 00:49:13.110000 audit: BPF prog-id=216 op=UNLOAD May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:49:13.110000 audit: BPF prog-id=218 op=LOAD May 17 00:49:13.110000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003866e8 items=0 ppid=4326 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:13.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343366653239633031336338333433653662363562633261336537 May 17 00:49:13.128861 env[1249]: time="2025-05-17T00:49:13.128832953Z" level=info msg="StartContainer for \"e243fe29c013c8343e6b65bc2a3e7f4e82ff342a55a409a3515aabb728af1521\" returns successfully" May 17 00:49:13.406696 kubelet[2109]: I0517 00:49:13.404746 2109 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:49:13.407522 kubelet[2109]: I0517 00:49:13.406918 2109 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:49:14.368685 env[1249]: time="2025-05-17T00:49:14.368590558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:49:14.421999 kubelet[2109]: I0517 00:49:14.416935 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xpczn" podStartSLOduration=30.466213867 podStartE2EDuration="40.414277674s" podCreationTimestamp="2025-05-17 00:48:34 +0000 UTC" firstStartedPulling="2025-05-17 00:49:03.099348374 +0000 UTC m=+47.109835175" lastFinishedPulling="2025-05-17 00:49:13.04741218 +0000 UTC m=+57.057898982" observedRunningTime="2025-05-17 00:49:14.406195508 +0000 UTC m=+58.416682318" watchObservedRunningTime="2025-05-17 00:49:14.414277674 +0000 UTC m=+58.424764484" May 17 00:49:14.430759 kubelet[2109]: I0517 00:49:14.422219 2109 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9c77f996f-ks4xp" podStartSLOduration=37.911236027 podStartE2EDuration="43.422207011s" podCreationTimestamp="2025-05-17 00:48:31 +0000 UTC" firstStartedPulling="2025-05-17 00:49:01.476675632 +0000 UTC m=+45.487162435" lastFinishedPulling="2025-05-17 00:49:06.987646622 +0000 UTC m=+50.998133419" observedRunningTime="2025-05-17 00:49:08.264824497 +0000 UTC m=+52.275311295" watchObservedRunningTime="2025-05-17 00:49:14.422207011 +0000 UTC m=+58.432693815" May 17 00:49:14.604287 env[1249]: time="2025-05-17T00:49:14.604162265Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:14.610458 env[1249]: time="2025-05-17T00:49:14.610383471Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:14.756487 kubelet[2109]: E0517 00:49:14.756411 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:14.799521 kubelet[2109]: E0517 00:49:14.799485 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:14.818063 kubelet[2109]: E0517 00:49:14.818018 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:a8116c64fdfd443f9c4c53c8396e5d72,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fwtm9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54dccb6fc9-mlvwj_calico-system(c6a68569-1a40-4107-ae66-83c7bdb18e09): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:14.819949 env[1249]: time="2025-05-17T00:49:14.819822806Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:49:15.068793 env[1249]: time="2025-05-17T00:49:15.068635965Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:15.069179 env[1249]: time="2025-05-17T00:49:15.069114627Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:15.069269 kubelet[2109]: E0517 00:49:15.069244 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:15.069331 kubelet[2109]: E0517 00:49:15.069279 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:15.069387 kubelet[2109]: E0517 00:49:15.069344 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fwtm9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54dccb6fc9-mlvwj_calico-system(c6a68569-1a40-4107-ae66-83c7bdb18e09): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:15.075802 kubelet[2109]: E0517 00:49:15.075773 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54dccb6fc9-mlvwj" podUID="c6a68569-1a40-4107-ae66-83c7bdb18e09" May 17 00:49:16.375396 env[1249]: time="2025-05-17T00:49:16.375185159Z" level=info msg="StopPodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\"" May 17 00:49:16.903000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:16.903000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:16.903000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c8cd40 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:49:16.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:16.903000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d726e0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:49:16.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:16.904000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:16.904000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:49:16.904000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c8cd60 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:49:16.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:16.904000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d72700 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:49:16.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:16.682 [WARNING][4611] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" WorkloadEndpoint="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:16.685 [INFO][4611] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:16.685 [INFO][4611] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" iface="eth0" netns="" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:16.685 [INFO][4611] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:16.685 [INFO][4611] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.054 [INFO][4618] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.057 [INFO][4618] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.058 [INFO][4618] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.071 [WARNING][4618] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.071 [INFO][4618] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.072 [INFO][4618] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.076612 env[1249]: 2025-05-17 00:49:17.074 [INFO][4611] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.078421 env[1249]: time="2025-05-17T00:49:17.076631832Z" level=info msg="TearDown network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" successfully" May 17 00:49:17.078421 env[1249]: time="2025-05-17T00:49:17.076657110Z" level=info msg="StopPodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" returns successfully" May 17 00:49:17.122915 env[1249]: time="2025-05-17T00:49:17.122887757Z" level=info msg="RemovePodSandbox for \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\"" May 17 00:49:17.123302 env[1249]: time="2025-05-17T00:49:17.123059286Z" level=info msg="Forcibly stopping sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\"" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.232 [WARNING][4634] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" WorkloadEndpoint="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.232 [INFO][4634] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.232 [INFO][4634] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" iface="eth0" netns="" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.232 [INFO][4634] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.232 [INFO][4634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.247 [INFO][4641] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.247 [INFO][4641] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.247 [INFO][4641] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.252 [WARNING][4641] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.252 [INFO][4641] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" HandleID="k8s-pod-network.b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" Workload="localhost-k8s-whisker--575d8ff7f9--sfwjf-eth0" May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.253 [INFO][4641] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.256694 env[1249]: 2025-05-17 00:49:17.255 [INFO][4634] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e" May 17 00:49:17.260426 env[1249]: time="2025-05-17T00:49:17.257053125Z" level=info msg="TearDown network for sandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" successfully" May 17 00:49:17.262888 env[1249]: time="2025-05-17T00:49:17.262868684Z" level=info msg="RemovePodSandbox \"b26a62ded456f6ec6f4f11d0eb4f37df0a9fcec03a62256ed89f83f98bfff49e\" returns successfully" May 17 00:49:17.268990 env[1249]: time="2025-05-17T00:49:17.268965687Z" level=info msg="StopPodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\"" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.309 [WARNING][4655] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29cd1609-7116-4876-aea6-bac14afee06d", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395", Pod:"coredns-668d6bf9bc-nwqz5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1fd992db73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.311 [INFO][4655] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.311 [INFO][4655] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" iface="eth0" netns="" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.311 [INFO][4655] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.311 [INFO][4655] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.333 [INFO][4662] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.336 [INFO][4662] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.336 [INFO][4662] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.345 [WARNING][4662] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.345 [INFO][4662] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.348 [INFO][4662] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.350937 env[1249]: 2025-05-17 00:49:17.349 [INFO][4655] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.354062 env[1249]: time="2025-05-17T00:49:17.351103278Z" level=info msg="TearDown network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" successfully" May 17 00:49:17.354062 env[1249]: time="2025-05-17T00:49:17.351123557Z" level=info msg="StopPodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" returns successfully" May 17 00:49:17.354062 env[1249]: time="2025-05-17T00:49:17.351448728Z" level=info msg="RemovePodSandbox for \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\"" May 17 00:49:17.354062 env[1249]: time="2025-05-17T00:49:17.351464823Z" level=info msg="Forcibly stopping sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\"" May 17 00:49:17.424146 kubelet[2109]: I0517 00:49:17.422388 2109 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.404 [WARNING][4676] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"29cd1609-7116-4876-aea6-bac14afee06d", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f240e47e1bb30eb3b5678cda63d1076dc0a6f5fe4d10a45687b4af83081e9395", Pod:"coredns-668d6bf9bc-nwqz5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1fd992db73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.404 [INFO][4676] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.404 [INFO][4676] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" iface="eth0" netns="" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.404 [INFO][4676] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.404 [INFO][4676] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.431 [INFO][4683] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.431 [INFO][4683] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.431 [INFO][4683] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.448 [WARNING][4683] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.448 [INFO][4683] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" HandleID="k8s-pod-network.92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" Workload="localhost-k8s-coredns--668d6bf9bc--nwqz5-eth0" May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.454 [INFO][4683] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.456636 env[1249]: 2025-05-17 00:49:17.455 [INFO][4676] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246" May 17 00:49:17.457165 env[1249]: time="2025-05-17T00:49:17.457144964Z" level=info msg="TearDown network for sandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" successfully" May 17 00:49:17.460842 env[1249]: time="2025-05-17T00:49:17.460823764Z" level=info msg="RemovePodSandbox \"92f337d19c3238ea45de76bf2ad70a3aa6fb588ac94f93c773541d2296d29246\" returns successfully" May 17 00:49:17.461220 env[1249]: time="2025-05-17T00:49:17.461209071Z" level=info msg="StopPodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\"" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.486 [WARNING][4697] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"58e37122-c913-439c-b4ab-707963c2e71f", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4", Pod:"calico-apiserver-9c77f996f-wp585", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0507efa2f80", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.486 [INFO][4697] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.486 [INFO][4697] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" iface="eth0" netns="" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.486 [INFO][4697] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.486 [INFO][4697] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.523 [INFO][4704] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.523 [INFO][4704] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.523 [INFO][4704] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.527 [WARNING][4704] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.527 [INFO][4704] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.528 [INFO][4704] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.530818 env[1249]: 2025-05-17 00:49:17.529 [INFO][4697] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.532872 env[1249]: time="2025-05-17T00:49:17.531027082Z" level=info msg="TearDown network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" successfully" May 17 00:49:17.532872 env[1249]: time="2025-05-17T00:49:17.531054468Z" level=info msg="StopPodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" returns successfully" May 17 00:49:17.532872 env[1249]: time="2025-05-17T00:49:17.531522517Z" level=info msg="RemovePodSandbox for \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\"" May 17 00:49:17.532872 env[1249]: time="2025-05-17T00:49:17.531548983Z" level=info msg="Forcibly stopping sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\"" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.602 [WARNING][4719] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"58e37122-c913-439c-b4ab-707963c2e71f", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"274bececdc990ef27faff43e2dd1090b6a56debfdb7a18dfd22b9ae2a620fab4", Pod:"calico-apiserver-9c77f996f-wp585", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0507efa2f80", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.602 [INFO][4719] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.602 [INFO][4719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" iface="eth0" netns="" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.602 [INFO][4719] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.602 [INFO][4719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.625 [INFO][4727] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.625 [INFO][4727] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.625 [INFO][4727] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.646 [WARNING][4727] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.646 [INFO][4727] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" HandleID="k8s-pod-network.a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" Workload="localhost-k8s-calico--apiserver--9c77f996f--wp585-eth0" May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.647 [INFO][4727] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.650063 env[1249]: 2025-05-17 00:49:17.648 [INFO][4719] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad" May 17 00:49:17.650520 env[1249]: time="2025-05-17T00:49:17.650499030Z" level=info msg="TearDown network for sandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" successfully" May 17 00:49:17.680032 env[1249]: time="2025-05-17T00:49:17.680005362Z" level=info msg="RemovePodSandbox \"a38be015bea8e0c4e8e724e9353f2164d06bd79ead14655dacaea689033da5ad\" returns successfully" May 17 00:49:17.791065 env[1249]: time="2025-05-17T00:49:17.790982593Z" level=info msg="StopPodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\"" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.842 [WARNING][4741] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"03278353-2b3c-4f49-8cf7-8e856b7ac899", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880", Pod:"coredns-668d6bf9bc-jd5qf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid18fc89a37d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.842 [INFO][4741] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.842 [INFO][4741] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" iface="eth0" netns="" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.842 [INFO][4741] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.842 [INFO][4741] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.862 [INFO][4748] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.862 [INFO][4748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.862 [INFO][4748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.870 [WARNING][4748] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.870 [INFO][4748] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.872 [INFO][4748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.875398 env[1249]: 2025-05-17 00:49:17.874 [INFO][4741] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.885411 env[1249]: time="2025-05-17T00:49:17.875417370Z" level=info msg="TearDown network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" successfully" May 17 00:49:17.885411 env[1249]: time="2025-05-17T00:49:17.875437092Z" level=info msg="StopPodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" returns successfully" May 17 00:49:17.923245 env[1249]: time="2025-05-17T00:49:17.923218663Z" level=info msg="RemovePodSandbox for \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\"" May 17 00:49:17.923422 env[1249]: time="2025-05-17T00:49:17.923395043Z" level=info msg="Forcibly stopping sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\"" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.951 [WARNING][4762] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"03278353-2b3c-4f49-8cf7-8e856b7ac899", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53c70d157f7f75093db5c7fa2cf6e6106c51df6734a934c15c8c0f27ca521880", Pod:"coredns-668d6bf9bc-jd5qf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid18fc89a37d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.952 [INFO][4762] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.952 [INFO][4762] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" iface="eth0" netns="" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.952 [INFO][4762] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.952 [INFO][4762] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.970 [INFO][4769] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.970 [INFO][4769] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.970 [INFO][4769] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.974 [WARNING][4769] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.974 [INFO][4769] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" HandleID="k8s-pod-network.8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" Workload="localhost-k8s-coredns--668d6bf9bc--jd5qf-eth0" May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.976 [INFO][4769] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:17.978734 env[1249]: 2025-05-17 00:49:17.977 [INFO][4762] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a" May 17 00:49:17.980258 env[1249]: time="2025-05-17T00:49:17.978969015Z" level=info msg="TearDown network for sandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" successfully" May 17 00:49:18.236820 env[1249]: time="2025-05-17T00:49:18.236786827Z" level=info msg="RemovePodSandbox \"8c1ffceb2c1bb5deec883b757b9c3c5ce929003d9aff9945b98d0cd29a856e9a\" returns successfully" May 17 00:49:18.237111 env[1249]: time="2025-05-17T00:49:18.237094952Z" level=info msg="StopPodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\"" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.300 [WARNING][4784] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"1cb71b2a-3dd4-4752-90f5-3091de8ccd48", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1", Pod:"goldmane-78d55f7ddc-58zhp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calidfec644f53a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.300 [INFO][4784] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.300 [INFO][4784] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" iface="eth0" netns="" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.300 [INFO][4784] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.300 [INFO][4784] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.326 [INFO][4791] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.326 [INFO][4791] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.326 [INFO][4791] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.345 [WARNING][4791] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.345 [INFO][4791] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.346 [INFO][4791] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.349991 env[1249]: 2025-05-17 00:49:18.348 [INFO][4784] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.353985 env[1249]: time="2025-05-17T00:49:18.350109239Z" level=info msg="TearDown network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" successfully" May 17 00:49:18.353985 env[1249]: time="2025-05-17T00:49:18.350130305Z" level=info msg="StopPodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" returns successfully" May 17 00:49:18.353985 env[1249]: time="2025-05-17T00:49:18.350478255Z" level=info msg="RemovePodSandbox for \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\"" May 17 00:49:18.353985 env[1249]: time="2025-05-17T00:49:18.350496149Z" level=info msg="Forcibly stopping sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\"" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.407 [WARNING][4805] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"1cb71b2a-3dd4-4752-90f5-3091de8ccd48", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d1e9d8b7eab90becec5651636a686344a6e23a2a37bf5797bef8f9900dcaf8b1", Pod:"goldmane-78d55f7ddc-58zhp", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calidfec644f53a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.407 [INFO][4805] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.407 [INFO][4805] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" iface="eth0" netns="" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.407 [INFO][4805] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.407 [INFO][4805] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.424 [INFO][4812] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.426 [INFO][4812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.426 [INFO][4812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.431 [WARNING][4812] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.431 [INFO][4812] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" HandleID="k8s-pod-network.db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" Workload="localhost-k8s-goldmane--78d55f7ddc--58zhp-eth0" May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.433 [INFO][4812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.435547 env[1249]: 2025-05-17 00:49:18.434 [INFO][4805] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488" May 17 00:49:18.442626 env[1249]: time="2025-05-17T00:49:18.435674111Z" level=info msg="TearDown network for sandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" successfully" May 17 00:49:18.442626 env[1249]: time="2025-05-17T00:49:18.441267302Z" level=info msg="RemovePodSandbox \"db0ac93c4b884b9665cf5c89a922278edd84892a5d38b7fede8320d08a637488\" returns successfully" May 17 00:49:18.442626 env[1249]: time="2025-05-17T00:49:18.441606967Z" level=info msg="StopPodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\"" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.501 [WARNING][4826] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0", GenerateName:"calico-kube-controllers-6c588fdff4-", Namespace:"calico-system", SelfLink:"", UID:"347fd784-22c2-4e9c-b501-28fa3f1ab25c", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c588fdff4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa", Pod:"calico-kube-controllers-6c588fdff4-cc4mr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali96f773dbc99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.502 [INFO][4826] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.502 [INFO][4826] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" iface="eth0" netns="" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.502 [INFO][4826] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.502 [INFO][4826] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.542 [INFO][4834] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.542 [INFO][4834] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.542 [INFO][4834] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.545 [WARNING][4834] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.545 [INFO][4834] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.547 [INFO][4834] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.551243 env[1249]: 2025-05-17 00:49:18.549 [INFO][4826] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.553837 env[1249]: time="2025-05-17T00:49:18.551507290Z" level=info msg="TearDown network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" successfully" May 17 00:49:18.553837 env[1249]: time="2025-05-17T00:49:18.551527165Z" level=info msg="StopPodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" returns successfully" May 17 00:49:18.554034 env[1249]: time="2025-05-17T00:49:18.554009817Z" level=info msg="RemovePodSandbox for \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\"" May 17 00:49:18.554130 env[1249]: time="2025-05-17T00:49:18.554106558Z" level=info msg="Forcibly stopping sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\"" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.590 [WARNING][4849] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0", GenerateName:"calico-kube-controllers-6c588fdff4-", Namespace:"calico-system", SelfLink:"", UID:"347fd784-22c2-4e9c-b501-28fa3f1ab25c", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c588fdff4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e1b61a850c5d406a2a556b39a3eeed5b25d819249d37cd6e72a2216a448b85aa", Pod:"calico-kube-controllers-6c588fdff4-cc4mr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali96f773dbc99", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.590 [INFO][4849] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.590 [INFO][4849] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" iface="eth0" netns="" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.590 [INFO][4849] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.590 [INFO][4849] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.613 [INFO][4856] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.614 [INFO][4856] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.614 [INFO][4856] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.617 [WARNING][4856] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.617 [INFO][4856] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" HandleID="k8s-pod-network.96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" Workload="localhost-k8s-calico--kube--controllers--6c588fdff4--cc4mr-eth0" May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.618 [INFO][4856] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.621479 env[1249]: 2025-05-17 00:49:18.619 [INFO][4849] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939" May 17 00:49:18.624098 env[1249]: time="2025-05-17T00:49:18.621874654Z" level=info msg="TearDown network for sandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" successfully" May 17 00:49:18.626505 env[1249]: time="2025-05-17T00:49:18.626491416Z" level=info msg="RemovePodSandbox \"96d849c69927c48c2282121bb5a205289e1b04314ee958f6461a8251f60f2939\" returns successfully" May 17 00:49:18.801812 env[1249]: time="2025-05-17T00:49:18.801661671Z" level=info msg="StopPodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\"" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.887 [WARNING][4870] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ef04eeb4-0013-414a-a9ac-8d69c29c2d59", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c", Pod:"calico-apiserver-9c77f996f-ks4xp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali976767c0cb8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.887 [INFO][4870] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.887 [INFO][4870] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" iface="eth0" netns="" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.887 [INFO][4870] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.887 [INFO][4870] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.923 [INFO][4878] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.923 [INFO][4878] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.923 [INFO][4878] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.927 [WARNING][4878] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.927 [INFO][4878] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.927 [INFO][4878] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:18.931012 env[1249]: 2025-05-17 00:49:18.929 [INFO][4870] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:18.945887 env[1249]: time="2025-05-17T00:49:18.931321532Z" level=info msg="TearDown network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" successfully" May 17 00:49:18.945887 env[1249]: time="2025-05-17T00:49:18.931344279Z" level=info msg="StopPodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" returns successfully" May 17 00:49:18.972926 env[1249]: time="2025-05-17T00:49:18.972901914Z" level=info msg="RemovePodSandbox for \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\"" May 17 00:49:18.973048 env[1249]: time="2025-05-17T00:49:18.973022012Z" level=info msg="Forcibly stopping sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\"" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.072 [WARNING][4892] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0", GenerateName:"calico-apiserver-9c77f996f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ef04eeb4-0013-414a-a9ac-8d69c29c2d59", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9c77f996f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"091a87bd4a31520543012d4800bb9f9c2b45bacf4f9c12f73c9877ef97bbb14c", Pod:"calico-apiserver-9c77f996f-ks4xp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali976767c0cb8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.072 [INFO][4892] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.072 [INFO][4892] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" iface="eth0" netns="" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.072 [INFO][4892] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.072 [INFO][4892] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.095 [INFO][4899] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.095 [INFO][4899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.095 [INFO][4899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.151 [WARNING][4899] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.153 [INFO][4899] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" HandleID="k8s-pod-network.fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" Workload="localhost-k8s-calico--apiserver--9c77f996f--ks4xp-eth0" May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.156 [INFO][4899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:19.158448 env[1249]: 2025-05-17 00:49:19.157 [INFO][4892] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671" May 17 00:49:19.165514 env[1249]: time="2025-05-17T00:49:19.158467546Z" level=info msg="TearDown network for sandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" successfully" May 17 00:49:19.242202 env[1249]: time="2025-05-17T00:49:19.242167929Z" level=info msg="RemovePodSandbox \"fdd96f4f646ddc4982306ec167313520d69c792fb5a2ecdca0e9ab682ee07671\" returns successfully" May 17 00:49:19.265990 env[1249]: time="2025-05-17T00:49:19.265963955Z" level=info msg="StopPodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\"" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.327 [WARNING][4915] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xpczn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cd10f665-ce0e-4c29-b06e-afa77ff31d8a", ResourceVersion:"1044", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d", Pod:"csi-node-driver-xpczn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia34d57c202b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.327 [INFO][4915] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.327 [INFO][4915] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" iface="eth0" netns="" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.327 [INFO][4915] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.327 [INFO][4915] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.355 [INFO][4922] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.355 [INFO][4922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.355 [INFO][4922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.359 [WARNING][4922] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.359 [INFO][4922] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.360 [INFO][4922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:19.363773 env[1249]: 2025-05-17 00:49:19.362 [INFO][4915] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.366740 env[1249]: time="2025-05-17T00:49:19.363808653Z" level=info msg="TearDown network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" successfully" May 17 00:49:19.366740 env[1249]: time="2025-05-17T00:49:19.363828289Z" level=info msg="StopPodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" returns successfully" May 17 00:49:19.366740 env[1249]: time="2025-05-17T00:49:19.364107376Z" level=info msg="RemovePodSandbox for \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\"" May 17 00:49:19.366740 env[1249]: time="2025-05-17T00:49:19.364139524Z" level=info msg="Forcibly stopping sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\"" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.402 [WARNING][4936] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xpczn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cd10f665-ce0e-4c29-b06e-afa77ff31d8a", ResourceVersion:"1044", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 48, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b11762d8548b3fb8bb698c901e837052f653b17de839a83ece3a9b11159a899d", Pod:"csi-node-driver-xpczn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia34d57c202b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.402 [INFO][4936] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.403 [INFO][4936] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" iface="eth0" netns="" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.403 [INFO][4936] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.403 [INFO][4936] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.438 [INFO][4943] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.438 [INFO][4943] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.438 [INFO][4943] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.454 [WARNING][4943] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.454 [INFO][4943] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" HandleID="k8s-pod-network.6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" Workload="localhost-k8s-csi--node--driver--xpczn-eth0" May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.456 [INFO][4943] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:49:19.458714 env[1249]: 2025-05-17 00:49:19.457 [INFO][4936] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc" May 17 00:49:19.471052 env[1249]: time="2025-05-17T00:49:19.458696063Z" level=info msg="TearDown network for sandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" successfully" May 17 00:49:19.475210 env[1249]: time="2025-05-17T00:49:19.475189598Z" level=info msg="RemovePodSandbox \"6875fff4fa8e762be2b363914ebc5fa01f1515d54661009a94aa7829824fa2dc\" returns successfully" May 17 00:49:19.806000 audit[4950]: NETFILTER_CFG table=filter:129 family=2 entries=13 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:19.851284 kernel: kauditd_printk_skb: 63 callbacks suppressed May 17 00:49:19.861808 kernel: audit: type=1325 audit(1747442959.806:1412): table=filter:129 family=2 entries=13 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:19.862515 kernel: audit: type=1300 audit(1747442959.806:1412): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcd8f9e7a0 a2=0 a3=7ffcd8f9e78c items=0 ppid=2248 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.862548 kernel: audit: type=1327 audit(1747442959.806:1412): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:19.863583 kernel: audit: type=1325 audit(1747442959.812:1413): table=nat:130 family=2 entries=27 op=nft_register_chain pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:19.863618 kernel: audit: type=1300 audit(1747442959.812:1413): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcd8f9e7a0 a2=0 a3=7ffcd8f9e78c items=0 ppid=2248 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.863645 kernel: audit: type=1327 audit(1747442959.812:1413): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:19.806000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcd8f9e7a0 a2=0 a3=7ffcd8f9e78c items=0 ppid=2248 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:19.812000 audit[4950]: NETFILTER_CFG table=nat:130 family=2 entries=27 op=nft_register_chain pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:19.812000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcd8f9e7a0 a2=0 a3=7ffcd8f9e78c items=0 ppid=2248 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:19.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:23.300350 env[1249]: time="2025-05-17T00:49:23.299770067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:49:23.578251 env[1249]: time="2025-05-17T00:49:23.578142159Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:23.578624 env[1249]: time="2025-05-17T00:49:23.578593904Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:23.592543 kubelet[2109]: E0517 00:49:23.587513 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:23.599765 kubelet[2109]: E0517 00:49:23.594948 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:49:23.604774 kubelet[2109]: E0517 00:49:23.603552 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fnssx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-58zhp_calico-system(1cb71b2a-3dd4-4752-90f5-3091de8ccd48): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:23.610153 kubelet[2109]: E0517 00:49:23.609841 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-58zhp" podUID="1cb71b2a-3dd4-4752-90f5-3091de8ccd48" May 17 00:49:26.215238 kubelet[2109]: E0517 00:49:26.215209 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54dccb6fc9-mlvwj" podUID="c6a68569-1a40-4107-ae66-83c7bdb18e09" May 17 00:49:26.661637 kubelet[2109]: I0517 00:49:26.661604 2109 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:49:26.991000 audit[4983]: NETFILTER_CFG table=filter:131 family=2 entries=12 op=nft_register_rule pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:27.021993 kernel: audit: type=1325 audit(1747442966.991:1414): table=filter:131 family=2 entries=12 op=nft_register_rule pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:27.026027 kernel: audit: type=1300 audit(1747442966.991:1414): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff899b1010 a2=0 a3=7fff899b0ffc items=0 ppid=2248 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:27.026060 kernel: audit: type=1327 audit(1747442966.991:1414): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:27.027342 kernel: audit: type=1325 audit(1747442967.001:1415): table=nat:132 family=2 entries=34 op=nft_register_chain pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:27.027384 kernel: audit: type=1300 audit(1747442967.001:1415): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff899b1010 a2=0 a3=7fff899b0ffc items=0 ppid=2248 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:27.028078 kernel: audit: type=1327 audit(1747442967.001:1415): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:26.991000 audit[4983]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff899b1010 a2=0 a3=7fff899b0ffc items=0 ppid=2248 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:26.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:27.001000 audit[4983]: NETFILTER_CFG table=nat:132 family=2 entries=34 op=nft_register_chain pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:49:27.001000 audit[4983]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff899b1010 a2=0 a3=7fff899b0ffc items=0 ppid=2248 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:27.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:49:29.385701 systemd[1]: run-containerd-runc-k8s.io-69c5dccb467860cc3790f4cdfa603d9ddbee2ac3b2ce69846819a85378374617-runc.aBJYsy.mount: Deactivated successfully. May 17 00:49:35.400034 kubelet[2109]: E0517 00:49:35.373125 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-58zhp" podUID="1cb71b2a-3dd4-4752-90f5-3091de8ccd48" May 17 00:49:37.294499 env[1249]: time="2025-05-17T00:49:37.294468962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:49:37.779673 env[1249]: time="2025-05-17T00:49:37.779632560Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:37.779943 env[1249]: time="2025-05-17T00:49:37.779923206Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:37.788008 kubelet[2109]: E0517 00:49:37.786667 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:37.789896 kubelet[2109]: E0517 00:49:37.789867 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:49:37.792212 kubelet[2109]: E0517 00:49:37.792169 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:a8116c64fdfd443f9c4c53c8396e5d72,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fwtm9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54dccb6fc9-mlvwj_calico-system(c6a68569-1a40-4107-ae66-83c7bdb18e09): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:37.795216 env[1249]: time="2025-05-17T00:49:37.795185464Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:49:38.172377 env[1249]: time="2025-05-17T00:49:38.172291854Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:49:38.190525 env[1249]: time="2025-05-17T00:49:38.190481773Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:49:38.197847 kubelet[2109]: E0517 00:49:38.190730 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:38.197847 kubelet[2109]: E0517 00:49:38.190762 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:49:38.210065 kubelet[2109]: E0517 00:49:38.210026 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fwtm9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-54dccb6fc9-mlvwj_calico-system(c6a68569-1a40-4107-ae66-83c7bdb18e09): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:49:38.240447 kubelet[2109]: E0517 00:49:38.240397 2109 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-54dccb6fc9-mlvwj" podUID="c6a68569-1a40-4107-ae66-83c7bdb18e09" May 17 00:49:44.776264 systemd[1]: Started sshd@7-139.178.70.107:22-147.75.109.163:45018.service. May 17 00:49:44.882972 kernel: audit: type=1130 audit(1747442984.789:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-147.75.109.163:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:44.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-147.75.109.163:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:45.157000 audit[5041]: USER_ACCT pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.169426 kernel: audit: type=1101 audit(1747442985.157:1417): pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.169472 kernel: audit: type=1103 audit(1747442985.160:1418): pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.169488 kernel: audit: type=1006 audit(1747442985.160:1419): pid=5041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:49:45.169502 kernel: audit: type=1300 audit(1747442985.160:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf9cb8530 a2=3 a3=0 items=0 ppid=1 pid=5041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:45.170733 kernel: audit: type=1327 audit(1747442985.160:1419): proctitle=737368643A20636F7265205B707269765D May 17 00:49:45.160000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.160000 audit[5041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf9cb8530 a2=3 a3=0 items=0 ppid=1 pid=5041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:45.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:49:45.183062 sshd[5041]: Accepted publickey for core from 147.75.109.163 port 45018 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:49:45.172444 sshd[5041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:45.259588 systemd-logind[1240]: New session 10 of user core. May 17 00:49:45.266736 systemd[1]: Started session-10.scope. May 17 00:49:45.270000 audit[5041]: USER_START pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.274000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.278387 kernel: audit: type=1105 audit(1747442985.270:1420): pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:45.278482 kernel: audit: type=1103 audit(1747442985.274:1421): pid=5043 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:48.491851 kubelet[2109]: E0517 00:49:48.478986 2109 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.523s" May 17 00:49:59.559710 sshd[5041]: pam_unix(sshd:session): session closed for user core May 17 00:49:59.639840 kernel: audit: type=1130 audit(1747442999.598:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.107:22-147.75.109.163:54920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:59.643217 kernel: audit: type=1106 audit(1747442999.605:1423): pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:59.643914 kernel: audit: type=1104 audit(1747442999.609:1424): pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:59.645499 kernel: audit: type=1131 audit(1747442999.618:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-147.75.109.163:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:59.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.107:22-147.75.109.163:54920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:59.605000 audit[5041]: USER_END pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:59.609000 audit[5041]: CRED_DISP pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:49:59.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-147.75.109.163:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:59.597089 systemd[1]: Started sshd@8-139.178.70.107:22-147.75.109.163:54920.service. May 17 00:49:59.618729 systemd[1]: sshd@7-139.178.70.107:22-147.75.109.163:45018.service: Deactivated successfully. May 17 00:49:59.620410 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:49:59.620492 systemd[1]: session-10.scope: Consumed 1.624s CPU time. May 17 00:49:59.621848 systemd-logind[1240]: Session 10 logged out. Waiting for processes to exit. May 17 00:49:59.622673 systemd-logind[1240]: Removed session 10. May 17 00:50:00.156901 sshd[5063]: Accepted publickey for core from 147.75.109.163 port 54920 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:50:00.155000 audit[5063]: USER_ACCT pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:00.156000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:00.163368 kernel: audit: type=1101 audit(1747443000.155:1426): pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:00.163411 kernel: audit: type=1103 audit(1747443000.156:1427): pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:00.163434 kernel: audit: type=1006 audit(1747443000.156:1428): pid=5063 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:50:00.156000 audit[5063]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd32ce79d0 a2=3 a3=0 items=0 ppid=1 pid=5063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:00.270711 kernel: audit: type=1300 audit(1747443000.156:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd32ce79d0 a2=3 a3=0 items=0 ppid=1 pid=5063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:00.270777 kernel: audit: type=1327 audit(1747443000.156:1428): proctitle=737368643A20636F7265205B707269765D May 17 00:50:00.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:00.194251 sshd[5063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:00.333309 systemd[1]: Started session-11.scope. May 17 00:50:00.333784 systemd-logind[1240]: New session 11 of user core. May 17 00:50:00.339000 audit[5063]: USER_START pid=5063 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:00.339000 audit[5066]: CRED_ACQ pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:00.344386 kernel: audit: type=1105 audit(1747443000.339:1429): pid=5063 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:08.729000 audit[4456]: AVC avc: denied { watch } for pid=4456 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.3733347298/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c497,c708 tclass=file permissive=0 May 17 00:50:08.842942 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:50:08.846928 kernel: audit: type=1400 audit(1747443008.729:1431): avc: denied { watch } for pid=4456 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.3733347298/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c497,c708 tclass=file permissive=0 May 17 00:50:08.850275 kernel: audit: type=1300 audit(1747443008.729:1431): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015eb420 a2=fc6 a3=0 items=0 ppid=3876 pid=4456 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 key=(null) May 17 00:50:08.850870 kernel: audit: type=1327 audit(1747443008.729:1431): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:08.729000 audit[4456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015eb420 a2=fc6 a3=0 items=0 ppid=3876 pid=4456 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 key=(null) May 17 00:50:08.903687 kernel: audit: type=1400 audit(1747443008.893:1432): avc: denied { watch } for pid=4494 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.2678725883/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c181,c733 tclass=file permissive=0 May 17 00:50:08.903791 kernel: audit: type=1300 audit(1747443008.893:1432): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00100e1c0 a2=fc6 a3=0 items=0 ppid=4104 pid=4494 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 key=(null) May 17 00:50:08.908678 kernel: audit: type=1327 audit(1747443008.893:1432): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:08.729000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:08.893000 audit[4494]: AVC avc: denied { watch } for pid=4494 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.2678725883/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c181,c733 tclass=file permissive=0 May 17 00:50:08.893000 audit[4494]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00100e1c0 a2=fc6 a3=0 items=0 ppid=4104 pid=4494 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 key=(null) May 17 00:50:08.893000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:50:11.848000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:11.975322 kernel: audit: type=1400 audit(1747443011.848:1433): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:11.982231 kernel: audit: type=1300 audit(1747443011.848:1433): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ef4b40 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:11.983025 kernel: audit: type=1327 audit(1747443011.848:1433): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:11.983060 kernel: audit: type=1400 audit(1747443011.864:1434): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:11.848000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ef4b40 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:11.848000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:11.864000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:11.864000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002deb6a0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:11.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:12.690000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:12.690000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00410f650 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:50:12.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:50:12.746000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:12.746000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00410f770 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:50:12.746000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:50:12.783000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:12.783000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c006999e20 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:50:12.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:50:12.876000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:12.876000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c005058360 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:50:12.876000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:50:12.881000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:12.881000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00d334ed0 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:50:12.881000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:50:12.883000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:12.883000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00d334f60 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:50:12.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:50:16.924000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:17.053289 kernel: kauditd_printk_skb: 20 callbacks suppressed May 17 00:50:17.079286 kernel: audit: type=1400 audit(1747443016.924:1441): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:17.084750 kernel: audit: type=1300 audit(1747443016.924:1441): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002fef0e0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:17.084799 kernel: audit: type=1327 audit(1747443016.924:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:17.084822 kernel: audit: type=1400 audit(1747443016.937:1442): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:17.086347 kernel: audit: type=1300 audit(1747443016.937:1442): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002debc20 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:17.087308 kernel: audit: type=1327 audit(1747443016.937:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:17.088550 kernel: audit: type=1400 audit(1747443016.941:1443): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:17.088589 kernel: audit: type=1300 audit(1747443016.941:1443): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002debc40 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:17.088614 kernel: audit: type=1327 audit(1747443016.941:1443): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:17.089671 kernel: audit: type=1400 audit(1747443016.967:1444): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:16.924000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002fef0e0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:16.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:16.937000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:16.937000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002debc20 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:16.937000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:16.941000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:16.941000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002debc40 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:16.941000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:16.967000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:50:16.967000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002debde0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:50:16.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:50:19.495951 sshd[5063]: pam_unix(sshd:session): session closed for user core May 17 00:50:19.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.107:22-147.75.109.163:60292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:19.550000 audit[5063]: USER_END pid=5063 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:19.551000 audit[5063]: CRED_DISP pid=5063 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:19.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.107:22-147.75.109.163:54920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:19.547512 systemd[1]: Started sshd@9-139.178.70.107:22-147.75.109.163:60292.service. May 17 00:50:19.563320 systemd[1]: sshd@8-139.178.70.107:22-147.75.109.163:54920.service: Deactivated successfully. May 17 00:50:19.564388 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:50:19.564440 systemd-logind[1240]: Session 11 logged out. Waiting for processes to exit. May 17 00:50:19.564478 systemd[1]: session-11.scope: Consumed 2.282s CPU time. May 17 00:50:19.565328 systemd-logind[1240]: Removed session 11. May 17 00:50:19.666000 audit[5120]: USER_ACCT pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:19.667755 sshd[5120]: Accepted publickey for core from 147.75.109.163 port 60292 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:50:19.667000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:19.667000 audit[5120]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97a448b0 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:19.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:19.676182 sshd[5120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:19.724297 systemd-logind[1240]: New session 12 of user core. May 17 00:50:19.725094 systemd[1]: Started session-12.scope. May 17 00:50:19.729000 audit[5120]: USER_START pid=5120 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:19.730000 audit[5123]: CRED_ACQ pid=5123 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.814522 sshd[5120]: pam_unix(sshd:session): session closed for user core May 17 00:50:29.886786 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:50:29.889323 kernel: audit: type=1130 audit(1747443029.845:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.107:22-147.75.109.163:33032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:29.891680 kernel: audit: type=1106 audit(1747443029.849:1455): pid=5120 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.891707 kernel: audit: type=1104 audit(1747443029.853:1456): pid=5120 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.891728 kernel: audit: type=1131 audit(1747443029.862:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.107:22-147.75.109.163:60292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:29.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.107:22-147.75.109.163:33032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:29.849000 audit[5120]: USER_END pid=5120 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.853000 audit[5120]: CRED_DISP pid=5120 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.107:22-147.75.109.163:60292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:29.843331 systemd[1]: Started sshd@10-139.178.70.107:22-147.75.109.163:33032.service. May 17 00:50:29.861921 systemd[1]: sshd@9-139.178.70.107:22-147.75.109.163:60292.service: Deactivated successfully. May 17 00:50:29.862947 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:50:29.863049 systemd[1]: session-12.scope: Consumed 1.491s CPU time. May 17 00:50:29.865842 systemd-logind[1240]: Session 12 logged out. Waiting for processes to exit. May 17 00:50:29.869303 systemd-logind[1240]: Removed session 12. May 17 00:50:29.941000 audit[5166]: USER_ACCT pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.945003 sshd[5166]: Accepted publickey for core from 147.75.109.163 port 33032 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:50:29.945946 kernel: audit: type=1101 audit(1747443029.941:1458): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.945975 kernel: audit: type=1103 audit(1747443029.945:1459): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.945000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.948224 sshd[5166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:29.950928 kernel: audit: type=1006 audit(1747443029.945:1460): pid=5166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:50:29.950961 kernel: audit: type=1300 audit(1747443029.945:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc354ed800 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.945000 audit[5166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc354ed800 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.965674 kernel: audit: type=1327 audit(1747443029.945:1460): proctitle=737368643A20636F7265205B707269765D May 17 00:50:29.945000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:29.982972 systemd[1]: Started session-13.scope. May 17 00:50:29.983920 systemd-logind[1240]: New session 13 of user core. May 17 00:50:29.986000 audit[5166]: USER_START pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.988000 audit[5169]: CRED_ACQ pid=5169 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:29.991442 kernel: audit: type=1105 audit(1747443029.986:1461): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:30.671980 sshd[5166]: pam_unix(sshd:session): session closed for user core May 17 00:50:30.674000 audit[5166]: USER_END pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:30.674000 audit[5166]: CRED_DISP pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:30.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.107:22-147.75.109.163:33032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:30.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.107:22-147.75.109.163:33034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:30.682760 systemd[1]: sshd@10-139.178.70.107:22-147.75.109.163:33032.service: Deactivated successfully. May 17 00:50:30.683200 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:50:30.684604 systemd-logind[1240]: Session 13 logged out. Waiting for processes to exit. May 17 00:50:30.686011 systemd[1]: Started sshd@11-139.178.70.107:22-147.75.109.163:33034.service. May 17 00:50:30.687104 systemd-logind[1240]: Removed session 13. May 17 00:50:30.817000 audit[5177]: USER_ACCT pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:30.818000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:30.818000 audit[5177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff87a47f70 a2=3 a3=0 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.818000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:30.835453 sshd[5177]: Accepted publickey for core from 147.75.109.163 port 33034 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:50:30.826559 sshd[5177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:30.839857 systemd[1]: Started session-14.scope. May 17 00:50:30.840074 systemd-logind[1240]: New session 14 of user core. May 17 00:50:30.844000 audit[5177]: USER_START pid=5177 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:30.850000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:36.209000 audit[5223]: NETFILTER_CFG table=filter:133 family=2 entries=24 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:36.396112 kernel: kauditd_printk_skb: 12 callbacks suppressed May 17 00:50:36.431520 kernel: audit: type=1325 audit(1747443036.209:1472): table=filter:133 family=2 entries=24 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:36.431591 kernel: audit: type=1300 audit(1747443036.209:1472): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffda20f35e0 a2=0 a3=7ffda20f35cc items=0 ppid=2248 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.431612 kernel: audit: type=1327 audit(1747443036.209:1472): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:36.431628 kernel: audit: type=1325 audit(1747443036.221:1473): table=nat:134 family=2 entries=22 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:36.440270 kernel: audit: type=1300 audit(1747443036.221:1473): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffda20f35e0 a2=0 a3=0 items=0 ppid=2248 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.462263 kernel: audit: type=1327 audit(1747443036.221:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:36.209000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffda20f35e0 a2=0 a3=7ffda20f35cc items=0 ppid=2248 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:36.221000 audit[5223]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:36.221000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffda20f35e0 a2=0 a3=0 items=0 ppid=2248 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:36.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:37.943000 audit[5225]: NETFILTER_CFG table=filter:135 family=2 entries=36 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:38.024468 kernel: audit: type=1325 audit(1747443037.943:1474): table=filter:135 family=2 entries=36 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:38.032538 kernel: audit: type=1300 audit(1747443037.943:1474): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff7c6a5150 a2=0 a3=7fff7c6a513c items=0 ppid=2248 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.036574 kernel: audit: type=1327 audit(1747443037.943:1474): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:38.037873 kernel: audit: type=1325 audit(1747443037.954:1475): table=nat:136 family=2 entries=22 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:37.943000 audit[5225]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff7c6a5150 a2=0 a3=7fff7c6a513c items=0 ppid=2248 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:37.954000 audit[5225]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:37.954000 audit[5225]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff7c6a5150 a2=0 a3=0 items=0 ppid=2248 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:38.318031 sshd[5177]: pam_unix(sshd:session): session closed for user core May 17 00:50:38.414000 audit[5177]: USER_END pid=5177 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:38.417000 audit[5177]: CRED_DISP pid=5177 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:38.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.107:22-147.75.109.163:47668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:38.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.107:22-147.75.109.163:33034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:38.417893 systemd[1]: Started sshd@12-139.178.70.107:22-147.75.109.163:47668.service. May 17 00:50:38.435444 systemd[1]: sshd@11-139.178.70.107:22-147.75.109.163:33034.service: Deactivated successfully. May 17 00:50:38.436713 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:50:38.437485 systemd-logind[1240]: Session 14 logged out. Waiting for processes to exit. May 17 00:50:38.437999 systemd-logind[1240]: Removed session 14. May 17 00:50:38.578000 audit[5227]: USER_ACCT pid=5227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:38.579000 audit[5227]: CRED_ACQ pid=5227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:38.579000 audit[5227]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffceb9cd930 a2=3 a3=0 items=0 ppid=1 pid=5227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:38.607064 sshd[5227]: Accepted publickey for core from 147.75.109.163 port 47668 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:50:38.596615 sshd[5227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:38.648256 systemd[1]: Started session-15.scope. May 17 00:50:38.648491 systemd-logind[1240]: New session 15 of user core. May 17 00:50:38.652000 audit[5227]: USER_START pid=5227 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:38.656000 audit[5230]: CRED_ACQ pid=5230 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:50:45.619000 audit[5236]: NETFILTER_CFG table=filter:137 family=2 entries=24 op=nft_register_rule pid=5236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:45.707739 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:50:45.713111 kernel: audit: type=1325 audit(1747443045.619:1485): table=filter:137 family=2 entries=24 op=nft_register_rule pid=5236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:45.713153 kernel: audit: type=1300 audit(1747443045.619:1485): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc34001ba0 a2=0 a3=7ffc34001b8c items=0 ppid=2248 pid=5236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.713177 kernel: audit: type=1327 audit(1747443045.619:1485): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:45.715087 kernel: audit: type=1325 audit(1747443045.630:1486): table=nat:138 family=2 entries=106 op=nft_register_chain pid=5236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:45.715115 kernel: audit: type=1300 audit(1747443045.630:1486): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc34001ba0 a2=0 a3=7ffc34001b8c items=0 ppid=2248 pid=5236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.715132 kernel: audit: type=1327 audit(1747443045.630:1486): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:45.619000 audit[5236]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc34001ba0 a2=0 a3=7ffc34001b8c items=0 ppid=2248 pid=5236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:45.630000 audit[5236]: NETFILTER_CFG table=nat:138 family=2 entries=106 op=nft_register_chain pid=5236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:45.630000 audit[5236]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc34001ba0 a2=0 a3=7ffc34001b8c items=0 ppid=2248 pid=5236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:51.359184 kubelet[2109]: E0517 00:50:38.666185 2109 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="40.587s" May 17 00:51:08.834000 audit[4456]: AVC avc: denied { watch } for pid=4456 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.3733347298/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c497,c708 tclass=file permissive=0 May 17 00:51:08.986421 kernel: audit: type=1400 audit(1747443068.834:1487): avc: denied { watch } for pid=4456 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.3733347298/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c497,c708 tclass=file permissive=0 May 17 00:51:08.989818 kernel: audit: type=1300 audit(1747443068.834:1487): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016d29e0 a2=fc6 a3=0 items=0 ppid=3876 pid=4456 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 key=(null) May 17 00:51:08.989899 kernel: audit: type=1327 audit(1747443068.834:1487): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:51:08.991598 kernel: audit: type=1400 audit(1747443068.894:1488): avc: denied { watch } for pid=4494 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.2678725883/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c181,c733 tclass=file permissive=0 May 17 00:51:08.991634 kernel: audit: type=1300 audit(1747443068.894:1488): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00100e920 a2=fc6 a3=0 items=0 ppid=4104 pid=4494 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 key=(null) May 17 00:51:08.991659 kernel: audit: type=1327 audit(1747443068.894:1488): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:51:08.834000 audit[4456]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016d29e0 a2=fc6 a3=0 items=0 ppid=3876 pid=4456 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c708 key=(null) May 17 00:51:08.834000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:51:08.894000 audit[4494]: AVC avc: denied { watch } for pid=4494 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_48_46.2678725883/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c181,c733 tclass=file permissive=0 May 17 00:51:08.894000 audit[4494]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00100e920 a2=fc6 a3=0 items=0 ppid=4104 pid=4494 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c181,c733 key=(null) May 17 00:51:08.894000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:51:11.911000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.037887 kernel: audit: type=1400 audit(1747443071.911:1489): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.069135 kernel: audit: type=1300 audit(1747443071.911:1489): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021780c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:12.069203 kernel: audit: type=1327 audit(1747443071.911:1489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:12.074839 kernel: audit: type=1400 audit(1747443071.911:1490): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:11.911000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0021780c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:11.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:11.911000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:11.911000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dff940 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:11.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:12.894000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.894000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00bbdcea0 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:51:12.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:51:12.895000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.895000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c009416160 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:51:12.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:51:12.899000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.899000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0094c94e0 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:51:12.899000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:51:12.925000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.925000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f7a0a20 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:51:12.925000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:51:12.931000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:12.931000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f7a0a50 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:51:12.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:51:13.042000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:13.042000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00bbdd170 a2=fc6 a3=0 items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c840 key=(null) May 17 00:51:13.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:51:15.008361 sshd[5227]: pam_unix(sshd:session): session closed for user core May 17 00:51:15.221872 kernel: kauditd_printk_skb: 20 callbacks suppressed May 17 00:51:15.241457 kernel: audit: type=1106 audit(1747443075.159:1497): pid=5227 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.251936 kernel: audit: type=1104 audit(1747443075.166:1498): pid=5227 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.251972 kernel: audit: type=1130 audit(1747443075.172:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.107:22-147.75.109.163:47776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:15.260654 kernel: audit: type=1131 audit(1747443075.186:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.107:22-147.75.109.163:47668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:15.159000 audit[5227]: USER_END pid=5227 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.166000 audit[5227]: CRED_DISP pid=5227 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.107:22-147.75.109.163:47776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:15.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.107:22-147.75.109.163:47668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:15.172972 systemd[1]: Started sshd@13-139.178.70.107:22-147.75.109.163:47776.service. May 17 00:51:15.186386 systemd[1]: sshd@12-139.178.70.107:22-147.75.109.163:47668.service: Deactivated successfully. May 17 00:51:15.187019 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:51:15.187145 systemd[1]: session-15.scope: Consumed 4.502s CPU time. May 17 00:51:15.187708 systemd-logind[1240]: Session 15 logged out. Waiting for processes to exit. May 17 00:51:15.188441 systemd-logind[1240]: Removed session 15. May 17 00:51:15.357000 audit[5265]: USER_ACCT pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.366017 kernel: audit: type=1101 audit(1747443075.357:1501): pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.368638 kernel: audit: type=1103 audit(1747443075.361:1502): pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.368665 kernel: audit: type=1006 audit(1747443075.361:1503): pid=5265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:51:15.361000 audit[5265]: CRED_ACQ pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.368739 sshd[5265]: Accepted publickey for core from 147.75.109.163 port 47776 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:51:15.364122 sshd[5265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:15.361000 audit[5265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9fdaf630 a2=3 a3=0 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:15.437738 kernel: audit: type=1300 audit(1747443075.361:1503): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9fdaf630 a2=3 a3=0 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:15.437827 kernel: audit: type=1327 audit(1747443075.361:1503): proctitle=737368643A20636F7265205B707269765D May 17 00:51:15.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:15.460206 systemd-logind[1240]: New session 16 of user core. May 17 00:51:15.460777 systemd[1]: Started session-16.scope. May 17 00:51:15.465000 audit[5265]: USER_START pid=5265 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.471571 kernel: audit: type=1105 audit(1747443075.465:1504): pid=5265 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:15.470000 audit[5268]: CRED_ACQ pid=5268 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:17.032000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:17.032000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015213c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:17.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:17.032000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:17.032000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ba84c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:17.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:17.046000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:17.046000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001521500 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:17.089000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:51:17.089000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001521520 a2=fc6 a3=0 items=0 ppid=1792 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c352,c614 key=(null) May 17 00:51:17.089000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:51:29.835000 audit[5282]: NETFILTER_CFG table=filter:139 family=2 entries=17 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:30.037376 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:51:30.072751 kernel: audit: type=1325 audit(1747443089.835:1510): table=filter:139 family=2 entries=17 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:30.085589 kernel: audit: type=1300 audit(1747443089.835:1510): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe112521e0 a2=0 a3=7ffe112521cc items=0 ppid=2248 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:30.096371 kernel: audit: type=1327 audit(1747443089.835:1510): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:30.102170 kernel: audit: type=1325 audit(1747443089.849:1511): table=nat:140 family=2 entries=87 op=nft_unregister_chain pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:30.109145 kernel: audit: type=1300 audit(1747443089.849:1511): arch=c000003e syscall=46 success=yes exit=13708 a0=3 a1=7ffe112521e0 a2=0 a3=7ffe112521cc items=0 ppid=2248 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:30.111915 kernel: audit: type=1327 audit(1747443089.849:1511): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:30.111954 kernel: audit: type=1325 audit(1747443089.888:1512): table=filter:141 family=2 entries=22 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:30.116149 kernel: audit: type=1300 audit(1747443089.888:1512): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc8376d880 a2=0 a3=7ffc8376d86c items=0 ppid=2248 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:30.116182 kernel: audit: type=1327 audit(1747443089.888:1512): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:30.123167 kernel: audit: type=1325 audit(1747443089.895:1513): table=nat:142 family=2 entries=36 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:29.835000 audit[5282]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe112521e0 a2=0 a3=7ffe112521cc items=0 ppid=2248 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:29.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:29.849000 audit[5282]: NETFILTER_CFG table=nat:140 family=2 entries=87 op=nft_unregister_chain pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:29.849000 audit[5282]: SYSCALL arch=c000003e syscall=46 success=yes exit=13708 a0=3 a1=7ffe112521e0 a2=0 a3=7ffe112521cc items=0 ppid=2248 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:29.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:29.888000 audit[5284]: NETFILTER_CFG table=filter:141 family=2 entries=22 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:29.888000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc8376d880 a2=0 a3=7ffc8376d86c items=0 ppid=2248 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:29.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:29.895000 audit[5284]: NETFILTER_CFG table=nat:142 family=2 entries=36 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:51:29.895000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=11916 a0=3 a1=7ffc8376d880 a2=0 a3=7ffc8376d86c items=0 ppid=2248 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:29.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:51:36.834706 env[1249]: time="2025-05-17T00:51:36.829865695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:51:37.125264 env[1249]: time="2025-05-17T00:51:37.125228732Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:51:37.203061 env[1249]: time="2025-05-17T00:51:37.203022893Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:51:40.688030 sshd[5265]: pam_unix(sshd:session): session closed for user core May 17 00:51:40.794075 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:51:40.794954 kernel: audit: type=1106 audit(1747443100.736:1514): pid=5265 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:40.796622 kernel: audit: type=1104 audit(1747443100.741:1515): pid=5265 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:40.796655 kernel: audit: type=1131 audit(1747443100.770:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.107:22-147.75.109.163:47776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:40.736000 audit[5265]: USER_END pid=5265 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:40.741000 audit[5265]: CRED_DISP pid=5265 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:51:40.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.107:22-147.75.109.163:47776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:40.768069 systemd[1]: sshd@13-139.178.70.107:22-147.75.109.163:47776.service: Deactivated successfully. May 17 00:51:40.772742 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:51:40.772827 systemd[1]: session-16.scope: Consumed 3.523s CPU time. May 17 00:51:40.776382 systemd-logind[1240]: Session 16 logged out. Waiting for processes to exit. May 17 00:51:40.789718 systemd-logind[1240]: Removed session 16. May 17 00:51:41.125709 kubelet[2109]: E0517 00:51:41.125670 2109 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" May 17 00:51:41.284118 kubelet[2109]: E0517 00:51:41.284093 2109 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" May 17 00:51:41.321209 kubelet[2109]: E0517 00:51:41.321161 2109 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:51:41.330141 kubelet[2109]: E0517 00:51:41.330099 2109 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:51:41.489525 kubelet[2109]: E0517 00:51:41.489451 2109 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" May 17 00:51:41.624726 systemd[1]: run-containerd-runc-k8s.io-6930970a78bff0bfe396b9a55d6e474fe5b367cc98990ad2c5cf001d0edc0190-runc.eQZwUk.mount: Deactivated successfully. May 17 00:51:41.813368 kubelet[2109]: E0517 00:51:41.808640 2109 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fnssx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-58zhp_calico-system(1cb71b2a-3dd4-4752-90f5-3091de8ccd48): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError"