May 17 00:39:34.645933 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:39:34.645948 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:39:34.645954 kernel: Disabled fast string operations May 17 00:39:34.645958 kernel: BIOS-provided physical RAM map: May 17 00:39:34.645962 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 17 00:39:34.645966 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 17 00:39:34.645972 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 17 00:39:34.645976 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 17 00:39:34.645980 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 17 00:39:34.645984 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 17 00:39:34.645988 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 17 00:39:34.645992 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 17 00:39:34.645996 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 17 00:39:34.646000 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 17 00:39:34.646006 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 17 00:39:34.646011 kernel: NX (Execute Disable) protection: active May 17 00:39:34.646015 kernel: SMBIOS 2.7 present. May 17 00:39:34.646020 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 17 00:39:34.646024 kernel: vmware: hypercall mode: 0x00 May 17 00:39:34.646029 kernel: Hypervisor detected: VMware May 17 00:39:34.646034 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 17 00:39:34.646039 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 17 00:39:34.646043 kernel: vmware: using clock offset of 4311857084 ns May 17 00:39:34.646048 kernel: tsc: Detected 3408.000 MHz processor May 17 00:39:34.646052 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:39:34.646057 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:39:34.646062 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 17 00:39:34.646067 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:39:34.646071 kernel: total RAM covered: 3072M May 17 00:39:34.646077 kernel: Found optimal setting for mtrr clean up May 17 00:39:34.646082 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 17 00:39:34.646086 kernel: Using GB pages for direct mapping May 17 00:39:34.646091 kernel: ACPI: Early table checksum verification disabled May 17 00:39:34.646096 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 17 00:39:34.646100 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 17 00:39:34.646105 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 17 00:39:34.646109 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 17 00:39:34.646114 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 17 00:39:34.646118 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 17 00:39:34.646124 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 17 00:39:34.646131 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 17 00:39:34.646135 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 17 00:39:34.646140 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 17 00:39:34.646145 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 17 00:39:34.646151 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 17 00:39:34.646156 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 17 00:39:34.646161 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 17 00:39:34.646166 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 17 00:39:34.646171 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 17 00:39:34.646176 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 17 00:39:34.646181 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 17 00:39:34.646186 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 17 00:39:34.646202 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 17 00:39:34.646209 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 17 00:39:34.646217 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 17 00:39:34.646226 kernel: system APIC only can use physical flat May 17 00:39:34.646231 kernel: Setting APIC routing to physical flat. May 17 00:39:34.646236 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:39:34.646241 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 17 00:39:34.646246 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 17 00:39:34.646251 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 17 00:39:34.646256 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 17 00:39:34.646262 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 17 00:39:34.646267 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 17 00:39:34.646271 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 17 00:39:34.646276 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 17 00:39:34.646281 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 17 00:39:34.646286 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 17 00:39:34.646291 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 17 00:39:34.646296 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 17 00:39:34.646303 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 17 00:39:34.646308 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 17 00:39:34.646317 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 17 00:39:34.652923 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 17 00:39:34.652931 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 17 00:39:34.652937 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 17 00:39:34.652942 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 17 00:39:34.652947 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 17 00:39:34.652952 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 17 00:39:34.652956 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 17 00:39:34.652961 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 17 00:39:34.652966 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 17 00:39:34.652973 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 17 00:39:34.652978 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 17 00:39:34.652983 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 17 00:39:34.652988 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 17 00:39:34.652993 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 17 00:39:34.652998 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 17 00:39:34.653003 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 17 00:39:34.653008 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 17 00:39:34.653013 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 17 00:39:34.653018 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 17 00:39:34.653024 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 17 00:39:34.653029 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 17 00:39:34.653034 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 17 00:39:34.653039 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 17 00:39:34.653044 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 17 00:39:34.653049 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 17 00:39:34.653054 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 17 00:39:34.653058 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 17 00:39:34.653063 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 17 00:39:34.653068 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 17 00:39:34.653074 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 17 00:39:34.653079 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 17 00:39:34.653084 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 17 00:39:34.653089 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 17 00:39:34.653094 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 17 00:39:34.653099 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 17 00:39:34.653104 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 17 00:39:34.653109 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 17 00:39:34.653114 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 17 00:39:34.653118 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 17 00:39:34.653124 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 17 00:39:34.653129 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 17 00:39:34.653134 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 17 00:39:34.653138 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 17 00:39:34.653143 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 17 00:39:34.653148 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 17 00:39:34.653158 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 17 00:39:34.653164 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 17 00:39:34.653169 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 17 00:39:34.653174 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 17 00:39:34.653179 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 17 00:39:34.653185 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 17 00:39:34.653191 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 17 00:39:34.653196 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 17 00:39:34.653201 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 17 00:39:34.653207 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 17 00:39:34.653212 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 17 00:39:34.653217 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 17 00:39:34.653223 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 17 00:39:34.653228 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 17 00:39:34.653233 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 17 00:39:34.653239 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 17 00:39:34.653244 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 17 00:39:34.653249 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 17 00:39:34.653254 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 17 00:39:34.653259 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 17 00:39:34.653265 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 17 00:39:34.653270 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 17 00:39:34.653276 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 17 00:39:34.653281 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 17 00:39:34.653287 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 17 00:39:34.653292 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 17 00:39:34.653297 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 17 00:39:34.653302 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 17 00:39:34.653307 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 17 00:39:34.653313 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 17 00:39:34.653318 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 17 00:39:34.653324 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 17 00:39:34.653329 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 17 00:39:34.653334 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 17 00:39:34.653340 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 17 00:39:34.653345 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 17 00:39:34.653350 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 17 00:39:34.653355 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 17 00:39:34.653360 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 17 00:39:34.653366 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 17 00:39:34.653371 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 17 00:39:34.653377 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 17 00:39:34.653382 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 17 00:39:34.653388 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 17 00:39:34.653393 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 17 00:39:34.653398 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 17 00:39:34.653403 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 17 00:39:34.653408 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 17 00:39:34.653414 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 17 00:39:34.653419 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 17 00:39:34.653424 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 17 00:39:34.653430 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 17 00:39:34.653435 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 17 00:39:34.653441 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 17 00:39:34.653446 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 17 00:39:34.653451 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 17 00:39:34.653457 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 17 00:39:34.653462 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 17 00:39:34.653467 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 17 00:39:34.653472 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 17 00:39:34.653477 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 17 00:39:34.653484 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 17 00:39:34.653489 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 17 00:39:34.653494 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 17 00:39:34.653500 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 17 00:39:34.653505 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 17 00:39:34.653510 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 17 00:39:34.653515 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:39:34.653521 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:39:34.653526 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 17 00:39:34.653532 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 17 00:39:34.653538 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 17 00:39:34.653544 kernel: Zone ranges: May 17 00:39:34.653549 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:39:34.653555 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 17 00:39:34.653560 kernel: Normal empty May 17 00:39:34.653565 kernel: Movable zone start for each node May 17 00:39:34.653571 kernel: Early memory node ranges May 17 00:39:34.653576 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 17 00:39:34.653581 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 17 00:39:34.653587 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 17 00:39:34.653593 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 17 00:39:34.653598 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:39:34.653603 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 17 00:39:34.653609 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 17 00:39:34.653614 kernel: ACPI: PM-Timer IO Port: 0x1008 May 17 00:39:34.653619 kernel: system APIC only can use physical flat May 17 00:39:34.653625 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 17 00:39:34.653630 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 17 00:39:34.653636 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 17 00:39:34.653641 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 17 00:39:34.653647 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 17 00:39:34.653652 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 17 00:39:34.653657 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 17 00:39:34.653662 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 17 00:39:34.653667 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 17 00:39:34.653673 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 17 00:39:34.653678 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 17 00:39:34.653683 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 17 00:39:34.653690 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 17 00:39:34.653695 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 17 00:39:34.653700 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 17 00:39:34.653706 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 17 00:39:34.653711 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 17 00:39:34.653716 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 17 00:39:34.653721 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 17 00:39:34.653727 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 17 00:39:34.653732 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 17 00:39:34.653738 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 17 00:39:34.653743 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 17 00:39:34.653748 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 17 00:39:34.653754 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 17 00:39:34.653759 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 17 00:39:34.653764 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 17 00:39:34.653770 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 17 00:39:34.653783 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 17 00:39:34.653789 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 17 00:39:34.653794 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 17 00:39:34.653801 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 17 00:39:34.653809 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 17 00:39:34.653815 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 17 00:39:34.653820 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 17 00:39:34.653825 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 17 00:39:34.653830 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 17 00:39:34.653836 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 17 00:39:34.653841 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 17 00:39:34.653846 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 17 00:39:34.653853 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 17 00:39:34.653858 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 17 00:39:34.653863 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 17 00:39:34.653868 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 17 00:39:34.653873 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 17 00:39:34.653879 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 17 00:39:34.653884 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 17 00:39:34.653889 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 17 00:39:34.653894 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 17 00:39:34.653900 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 17 00:39:34.653906 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 17 00:39:34.653911 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 17 00:39:34.653916 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 17 00:39:34.653922 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 17 00:39:34.653927 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 17 00:39:34.653932 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 17 00:39:34.653937 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 17 00:39:34.653943 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 17 00:39:34.653948 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 17 00:39:34.653954 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 17 00:39:34.653959 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 17 00:39:34.653965 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 17 00:39:34.653970 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 17 00:39:34.653975 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 17 00:39:34.653980 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 17 00:39:34.653985 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 17 00:39:34.653991 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 17 00:39:34.653996 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 17 00:39:34.654001 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 17 00:39:34.654008 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 17 00:39:34.654013 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 17 00:39:34.654018 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 17 00:39:34.654024 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 17 00:39:34.654029 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 17 00:39:34.654034 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 17 00:39:34.654039 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 17 00:39:34.654045 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 17 00:39:34.654050 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 17 00:39:34.654056 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 17 00:39:34.654061 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 17 00:39:34.654067 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 17 00:39:34.654072 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 17 00:39:34.654077 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 17 00:39:34.654082 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 17 00:39:34.654088 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 17 00:39:34.654093 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 17 00:39:34.654098 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 17 00:39:34.654103 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 17 00:39:34.654109 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 17 00:39:34.654115 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 17 00:39:34.654120 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 17 00:39:34.654125 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 17 00:39:34.654130 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 17 00:39:34.654135 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 17 00:39:34.654141 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 17 00:39:34.654146 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 17 00:39:34.654151 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 17 00:39:34.654158 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 17 00:39:34.654163 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 17 00:39:34.654168 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 17 00:39:34.654173 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 17 00:39:34.654178 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 17 00:39:34.654184 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 17 00:39:34.654189 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 17 00:39:34.654194 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 17 00:39:34.654200 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 17 00:39:34.654205 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 17 00:39:34.654211 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 17 00:39:34.654216 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 17 00:39:34.654221 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 17 00:39:34.654226 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 17 00:39:34.654232 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 17 00:39:34.654237 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 17 00:39:34.654242 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 17 00:39:34.654247 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 17 00:39:34.654253 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 17 00:39:34.654259 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 17 00:39:34.654264 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 17 00:39:34.654270 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 17 00:39:34.654275 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 17 00:39:34.654280 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 17 00:39:34.654285 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 17 00:39:34.654291 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 17 00:39:34.654296 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 17 00:39:34.654301 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 17 00:39:34.654307 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 17 00:39:34.654313 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 17 00:39:34.654318 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 17 00:39:34.654323 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 17 00:39:34.654329 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 17 00:39:34.654334 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:39:34.654339 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 17 00:39:34.654344 kernel: TSC deadline timer available May 17 00:39:34.654350 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 17 00:39:34.654355 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 17 00:39:34.654361 kernel: Booting paravirtualized kernel on VMware hypervisor May 17 00:39:34.654367 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:39:34.654372 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 17 00:39:34.654378 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 17 00:39:34.654383 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 17 00:39:34.654388 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 17 00:39:34.654393 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 17 00:39:34.654398 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 17 00:39:34.654404 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 17 00:39:34.654410 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 17 00:39:34.654415 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 17 00:39:34.654420 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 17 00:39:34.654432 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 17 00:39:34.654439 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 17 00:39:34.654444 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 17 00:39:34.654450 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 17 00:39:34.654455 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 17 00:39:34.654462 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 17 00:39:34.654467 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 17 00:39:34.654473 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 17 00:39:34.654478 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 17 00:39:34.654484 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 17 00:39:34.654490 kernel: Policy zone: DMA32 May 17 00:39:34.654496 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:39:34.654502 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:39:34.654508 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 17 00:39:34.654514 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 17 00:39:34.654520 kernel: printk: log_buf_len min size: 262144 bytes May 17 00:39:34.654526 kernel: printk: log_buf_len: 1048576 bytes May 17 00:39:34.654531 kernel: printk: early log buf free: 239728(91%) May 17 00:39:34.654537 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:39:34.654543 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:39:34.654548 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:39:34.654554 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) May 17 00:39:34.654561 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 17 00:39:34.654566 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:39:34.654572 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:39:34.654579 kernel: rcu: Hierarchical RCU implementation. May 17 00:39:34.654585 kernel: rcu: RCU event tracing is enabled. May 17 00:39:34.654591 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 17 00:39:34.654599 kernel: Rude variant of Tasks RCU enabled. May 17 00:39:34.654605 kernel: Tracing variant of Tasks RCU enabled. May 17 00:39:34.654610 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:39:34.654616 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 17 00:39:34.654622 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 17 00:39:34.654627 kernel: random: crng init done May 17 00:39:34.654633 kernel: Console: colour VGA+ 80x25 May 17 00:39:34.654639 kernel: printk: console [tty0] enabled May 17 00:39:34.654644 kernel: printk: console [ttyS0] enabled May 17 00:39:34.654651 kernel: ACPI: Core revision 20210730 May 17 00:39:34.654657 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 17 00:39:34.654662 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:39:34.654668 kernel: x2apic enabled May 17 00:39:34.654674 kernel: Switched APIC routing to physical x2apic. May 17 00:39:34.654679 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:39:34.654685 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 17 00:39:34.654691 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 17 00:39:34.654697 kernel: Disabled fast string operations May 17 00:39:34.654703 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:39:34.654709 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:39:34.654715 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:39:34.654721 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 17 00:39:34.654727 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 00:39:34.654732 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 00:39:34.654738 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 17 00:39:34.654744 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 17 00:39:34.654750 kernel: RETBleed: Mitigation: Enhanced IBRS May 17 00:39:34.654757 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:39:34.654762 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:39:34.654768 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:39:34.654780 kernel: SRBDS: Unknown: Dependent on hypervisor status May 17 00:39:34.654786 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:39:34.654791 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:39:34.654797 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:39:34.654806 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:39:34.654812 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:39:34.654819 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 17 00:39:34.654825 kernel: Freeing SMP alternatives memory: 32K May 17 00:39:34.654830 kernel: pid_max: default: 131072 minimum: 1024 May 17 00:39:34.654836 kernel: LSM: Security Framework initializing May 17 00:39:34.654842 kernel: SELinux: Initializing. May 17 00:39:34.654847 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:39:34.654853 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:39:34.654859 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 17 00:39:34.654865 kernel: Performance Events: Skylake events, core PMU driver. May 17 00:39:34.654871 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 17 00:39:34.654877 kernel: core: CPUID marked event: 'instructions' unavailable May 17 00:39:34.654882 kernel: core: CPUID marked event: 'bus cycles' unavailable May 17 00:39:34.654888 kernel: core: CPUID marked event: 'cache references' unavailable May 17 00:39:34.654893 kernel: core: CPUID marked event: 'cache misses' unavailable May 17 00:39:34.654899 kernel: core: CPUID marked event: 'branch instructions' unavailable May 17 00:39:34.654904 kernel: core: CPUID marked event: 'branch misses' unavailable May 17 00:39:34.654910 kernel: ... version: 1 May 17 00:39:34.654917 kernel: ... bit width: 48 May 17 00:39:34.654922 kernel: ... generic registers: 4 May 17 00:39:34.654928 kernel: ... value mask: 0000ffffffffffff May 17 00:39:34.654934 kernel: ... max period: 000000007fffffff May 17 00:39:34.654939 kernel: ... fixed-purpose events: 0 May 17 00:39:34.654945 kernel: ... event mask: 000000000000000f May 17 00:39:34.654951 kernel: signal: max sigframe size: 1776 May 17 00:39:34.654956 kernel: rcu: Hierarchical SRCU implementation. May 17 00:39:34.654962 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:39:34.654968 kernel: smp: Bringing up secondary CPUs ... May 17 00:39:34.654975 kernel: x86: Booting SMP configuration: May 17 00:39:34.654980 kernel: .... node #0, CPUs: #1 May 17 00:39:34.654986 kernel: Disabled fast string operations May 17 00:39:34.654992 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 17 00:39:34.654998 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 17 00:39:34.655004 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:39:34.655009 kernel: smpboot: Max logical packages: 128 May 17 00:39:34.655015 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 17 00:39:34.655021 kernel: devtmpfs: initialized May 17 00:39:34.655028 kernel: x86/mm: Memory block size: 128MB May 17 00:39:34.655033 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 17 00:39:34.655039 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:39:34.655045 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 17 00:39:34.655050 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:39:34.655056 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:39:34.655062 kernel: audit: initializing netlink subsys (disabled) May 17 00:39:34.655068 kernel: audit: type=2000 audit(1747442373.058:1): state=initialized audit_enabled=0 res=1 May 17 00:39:34.655073 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:39:34.655080 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:39:34.655085 kernel: cpuidle: using governor menu May 17 00:39:34.655091 kernel: Simple Boot Flag at 0x36 set to 0x80 May 17 00:39:34.655097 kernel: ACPI: bus type PCI registered May 17 00:39:34.655102 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:39:34.655108 kernel: dca service started, version 1.12.1 May 17 00:39:34.655114 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 17 00:39:34.655120 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 17 00:39:34.655125 kernel: PCI: Using configuration type 1 for base access May 17 00:39:34.655132 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:39:34.655137 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:39:34.655143 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:39:34.655149 kernel: ACPI: Added _OSI(Module Device) May 17 00:39:34.655155 kernel: ACPI: Added _OSI(Processor Device) May 17 00:39:34.655160 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:39:34.655166 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:39:34.655172 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:39:34.655177 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:39:34.655184 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:39:34.655190 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:39:34.655195 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 17 00:39:34.655201 kernel: ACPI: Interpreter enabled May 17 00:39:34.655207 kernel: ACPI: PM: (supports S0 S1 S5) May 17 00:39:34.655212 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:39:34.655218 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:39:34.655224 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 17 00:39:34.655230 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 17 00:39:34.655308 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 00:39:34.655359 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 17 00:39:34.655404 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 17 00:39:34.655413 kernel: PCI host bridge to bus 0000:00 May 17 00:39:34.655459 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:39:34.655502 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 17 00:39:34.655546 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 17 00:39:34.655587 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:39:34.655627 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 17 00:39:34.655667 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 17 00:39:34.655721 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 17 00:39:34.655783 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 17 00:39:34.655837 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 17 00:39:34.655890 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 17 00:39:34.655938 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 17 00:39:34.655984 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:39:34.656032 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:39:34.656078 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:39:34.656839 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:39:34.656910 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 17 00:39:34.656965 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 17 00:39:34.657017 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 17 00:39:34.657072 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 17 00:39:34.657124 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 17 00:39:34.657174 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 17 00:39:34.657228 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 17 00:39:34.657280 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 17 00:39:34.657330 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 17 00:39:34.657379 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 17 00:39:34.657428 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 17 00:39:34.657477 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:39:34.657531 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 17 00:39:34.657585 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.657637 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 17 00:39:34.657690 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.657743 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 17 00:39:34.657819 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.657872 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 17 00:39:34.657928 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.657981 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 17 00:39:34.658034 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658084 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 17 00:39:34.658136 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658186 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 17 00:39:34.658241 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658293 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 17 00:39:34.658360 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658412 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 17 00:39:34.658461 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658508 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 17 00:39:34.658560 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658606 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 17 00:39:34.658655 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658701 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 17 00:39:34.658751 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658818 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 17 00:39:34.658872 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.658922 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 17 00:39:34.658971 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659018 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 17 00:39:34.659067 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659114 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 17 00:39:34.659163 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659212 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 17 00:39:34.659261 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659307 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 17 00:39:34.659357 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659403 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 17 00:39:34.659452 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659501 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 17 00:39:34.659550 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659596 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 17 00:39:34.659648 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659694 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 17 00:39:34.659743 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659799 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 17 00:39:34.659851 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659897 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 17 00:39:34.659946 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.659992 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 17 00:39:34.660043 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660092 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 17 00:39:34.660140 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660187 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 17 00:39:34.660238 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660284 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 17 00:39:34.660332 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660379 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 17 00:39:34.660432 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660479 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 17 00:39:34.660528 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660574 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 17 00:39:34.660624 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660671 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 17 00:39:34.660722 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 17 00:39:34.660769 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 17 00:39:34.660862 kernel: pci_bus 0000:01: extended config space not accessible May 17 00:39:34.660910 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 00:39:34.660957 kernel: pci_bus 0000:02: extended config space not accessible May 17 00:39:34.660966 kernel: acpiphp: Slot [32] registered May 17 00:39:34.660972 kernel: acpiphp: Slot [33] registered May 17 00:39:34.660980 kernel: acpiphp: Slot [34] registered May 17 00:39:34.660986 kernel: acpiphp: Slot [35] registered May 17 00:39:34.660992 kernel: acpiphp: Slot [36] registered May 17 00:39:34.660997 kernel: acpiphp: Slot [37] registered May 17 00:39:34.661003 kernel: acpiphp: Slot [38] registered May 17 00:39:34.661009 kernel: acpiphp: Slot [39] registered May 17 00:39:34.661015 kernel: acpiphp: Slot [40] registered May 17 00:39:34.661021 kernel: acpiphp: Slot [41] registered May 17 00:39:34.661027 kernel: acpiphp: Slot [42] registered May 17 00:39:34.661034 kernel: acpiphp: Slot [43] registered May 17 00:39:34.661039 kernel: acpiphp: Slot [44] registered May 17 00:39:34.661045 kernel: acpiphp: Slot [45] registered May 17 00:39:34.661051 kernel: acpiphp: Slot [46] registered May 17 00:39:34.661056 kernel: acpiphp: Slot [47] registered May 17 00:39:34.661062 kernel: acpiphp: Slot [48] registered May 17 00:39:34.661068 kernel: acpiphp: Slot [49] registered May 17 00:39:34.661073 kernel: acpiphp: Slot [50] registered May 17 00:39:34.661079 kernel: acpiphp: Slot [51] registered May 17 00:39:34.661085 kernel: acpiphp: Slot [52] registered May 17 00:39:34.661091 kernel: acpiphp: Slot [53] registered May 17 00:39:34.661097 kernel: acpiphp: Slot [54] registered May 17 00:39:34.661102 kernel: acpiphp: Slot [55] registered May 17 00:39:34.661108 kernel: acpiphp: Slot [56] registered May 17 00:39:34.661114 kernel: acpiphp: Slot [57] registered May 17 00:39:34.661120 kernel: acpiphp: Slot [58] registered May 17 00:39:34.661126 kernel: acpiphp: Slot [59] registered May 17 00:39:34.661131 kernel: acpiphp: Slot [60] registered May 17 00:39:34.661137 kernel: acpiphp: Slot [61] registered May 17 00:39:34.661144 kernel: acpiphp: Slot [62] registered May 17 00:39:34.661149 kernel: acpiphp: Slot [63] registered May 17 00:39:34.661195 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 17 00:39:34.661242 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 17 00:39:34.661287 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 17 00:39:34.661331 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:39:34.661375 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 17 00:39:34.661420 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 17 00:39:34.661466 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 17 00:39:34.661513 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 17 00:39:34.661558 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 17 00:39:34.661609 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 17 00:39:34.661657 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 17 00:39:34.661703 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 17 00:39:34.661749 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 17 00:39:34.661830 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 17 00:39:34.661878 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 17 00:39:34.661925 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 17 00:39:34.661970 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 17 00:39:34.662016 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 17 00:39:34.662062 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 17 00:39:34.662108 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 17 00:39:34.662152 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 17 00:39:34.662200 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:39:34.662273 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 17 00:39:34.662321 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 17 00:39:34.662372 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 17 00:39:34.662419 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:39:34.662466 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 17 00:39:34.662511 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 17 00:39:34.662560 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:39:34.662605 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 17 00:39:34.662650 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 17 00:39:34.662696 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:39:34.662744 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 17 00:39:34.662797 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 17 00:39:34.662845 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:39:34.662891 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 17 00:39:34.662937 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 17 00:39:34.662982 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:39:34.663028 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 17 00:39:34.663073 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 17 00:39:34.663119 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:39:34.663173 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 17 00:39:34.663222 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 17 00:39:34.663270 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 17 00:39:34.663317 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 17 00:39:34.663363 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 17 00:39:34.663410 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 17 00:39:34.663458 kernel: pci 0000:0b:00.0: supports D1 D2 May 17 00:39:34.663507 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 17 00:39:34.663554 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 17 00:39:34.663599 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 17 00:39:34.663645 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 17 00:39:34.663691 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 17 00:39:34.663736 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 17 00:39:34.665244 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 17 00:39:34.665298 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 17 00:39:34.665347 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:39:34.665395 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 17 00:39:34.665440 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 17 00:39:34.665485 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 17 00:39:34.665530 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:39:34.665575 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 17 00:39:34.665620 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 17 00:39:34.665667 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:39:34.665712 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 17 00:39:34.665758 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 17 00:39:34.665812 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:39:34.665859 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 17 00:39:34.665905 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 17 00:39:34.665950 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:39:34.665996 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 17 00:39:34.666045 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 17 00:39:34.666089 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:39:34.666136 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 17 00:39:34.666181 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 17 00:39:34.666226 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:39:34.666272 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 17 00:39:34.666317 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 17 00:39:34.666363 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 17 00:39:34.666411 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:39:34.666458 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 17 00:39:34.666503 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 17 00:39:34.666549 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 17 00:39:34.666595 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:39:34.666641 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 17 00:39:34.666686 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 17 00:39:34.666731 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 17 00:39:34.676811 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:39:34.676891 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 17 00:39:34.676943 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 17 00:39:34.676991 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:39:34.677039 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 17 00:39:34.677086 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 17 00:39:34.677131 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:39:34.677184 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 17 00:39:34.677230 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 17 00:39:34.677276 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:39:34.677322 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 17 00:39:34.677368 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 17 00:39:34.677414 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:39:34.677461 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 17 00:39:34.677507 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 17 00:39:34.677554 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:39:34.677603 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 17 00:39:34.677650 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 17 00:39:34.677704 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 17 00:39:34.677749 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:39:34.677822 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 17 00:39:34.677896 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 17 00:39:34.677968 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 17 00:39:34.678039 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:39:34.678111 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 17 00:39:34.678183 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 17 00:39:34.678237 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:39:34.678284 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 17 00:39:34.678330 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 17 00:39:34.678375 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:39:34.678423 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 17 00:39:34.678472 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 17 00:39:34.678517 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:39:34.678566 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 17 00:39:34.678610 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 17 00:39:34.678656 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:39:34.678703 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 17 00:39:34.678750 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 17 00:39:34.678810 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:39:34.678863 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 17 00:39:34.678909 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 17 00:39:34.678955 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:39:34.678964 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 17 00:39:34.678970 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 17 00:39:34.678976 kernel: ACPI: PCI: Interrupt link LNKB disabled May 17 00:39:34.678982 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:39:34.678988 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 17 00:39:34.678994 kernel: iommu: Default domain type: Translated May 17 00:39:34.679001 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:39:34.679048 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 17 00:39:34.679094 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:39:34.679140 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 17 00:39:34.679149 kernel: vgaarb: loaded May 17 00:39:34.679155 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:39:34.679162 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:39:34.679168 kernel: PTP clock support registered May 17 00:39:34.679174 kernel: PCI: Using ACPI for IRQ routing May 17 00:39:34.679181 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:39:34.679187 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 17 00:39:34.679193 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 17 00:39:34.679199 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 17 00:39:34.679205 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 17 00:39:34.679210 kernel: clocksource: Switched to clocksource tsc-early May 17 00:39:34.679216 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:39:34.679222 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:39:34.679228 kernel: pnp: PnP ACPI init May 17 00:39:34.679280 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 17 00:39:34.679331 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 17 00:39:34.679390 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 17 00:39:34.679452 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 17 00:39:34.679521 kernel: pnp 00:06: [dma 2] May 17 00:39:34.679592 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 17 00:39:34.679660 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 17 00:39:34.679718 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 17 00:39:34.679730 kernel: pnp: PnP ACPI: found 8 devices May 17 00:39:34.679739 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:39:34.679746 kernel: NET: Registered PF_INET protocol family May 17 00:39:34.679751 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:39:34.679757 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:39:34.679763 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:39:34.681146 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:39:34.681156 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:39:34.681162 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:39:34.681168 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:39:34.681174 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:39:34.681180 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:39:34.681186 kernel: NET: Registered PF_XDP protocol family May 17 00:39:34.681256 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 17 00:39:34.681315 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 17 00:39:34.681366 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 17 00:39:34.681415 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 17 00:39:34.681466 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 17 00:39:34.681517 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 17 00:39:34.681565 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 17 00:39:34.681615 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 17 00:39:34.681664 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 17 00:39:34.681716 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 17 00:39:34.681766 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 17 00:39:34.681882 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 17 00:39:34.681931 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 17 00:39:34.681994 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 17 00:39:34.682043 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 17 00:39:34.682102 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 17 00:39:34.682203 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 17 00:39:34.682258 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 17 00:39:34.682308 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 17 00:39:34.682366 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 17 00:39:34.682414 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 17 00:39:34.682462 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 17 00:39:34.682516 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 17 00:39:34.682564 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:39:34.682610 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:39:34.682660 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.682705 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.682756 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.682823 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.682871 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.682916 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.682966 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683013 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683062 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683107 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683154 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683201 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683253 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683299 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683384 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683445 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683514 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683591 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683654 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683734 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683898 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.683946 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.683994 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684039 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684094 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684141 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684188 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684234 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684281 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684331 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684379 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684425 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684475 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684520 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684572 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684618 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684665 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684710 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684758 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684821 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684872 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.684918 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.684965 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685011 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685061 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685117 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685173 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685219 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685265 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685318 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685364 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685411 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685456 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685506 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685552 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685598 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685644 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685689 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685740 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685805 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685852 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685898 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.685944 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.685995 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686042 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686092 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686145 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686215 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686289 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686361 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686423 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686495 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686543 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686596 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686643 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686690 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686748 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686873 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.686928 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 17 00:39:34.686974 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.687020 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 17 00:39:34.687087 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.687158 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 17 00:39:34.687234 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 17 00:39:34.687315 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 00:39:34.687394 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 17 00:39:34.687472 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 17 00:39:34.687531 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 17 00:39:34.687606 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:39:34.687692 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 17 00:39:34.687763 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 17 00:39:34.687854 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 17 00:39:34.687927 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 17 00:39:34.687993 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:39:34.688060 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 17 00:39:34.688111 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 17 00:39:34.688157 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 17 00:39:34.688202 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:39:34.688250 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 17 00:39:34.689765 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 17 00:39:34.689944 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 17 00:39:34.689994 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:39:34.690043 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 17 00:39:34.690429 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 17 00:39:34.690480 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:39:34.690532 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 17 00:39:34.690578 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 17 00:39:34.690928 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:39:34.690986 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 17 00:39:34.691035 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 17 00:39:34.691082 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:39:34.691132 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 17 00:39:34.691179 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 17 00:39:34.691226 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:39:34.691274 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 17 00:39:34.691320 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 17 00:39:34.691366 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:39:34.691437 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 17 00:39:34.691497 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 17 00:39:34.691545 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 17 00:39:34.691592 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 17 00:39:34.691638 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:39:34.691685 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 17 00:39:34.692108 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 17 00:39:34.692162 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 17 00:39:34.692210 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:39:34.692259 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 17 00:39:34.692304 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 17 00:39:34.692351 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 17 00:39:34.692399 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:39:34.692448 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 17 00:39:34.692493 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 17 00:39:34.692539 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:39:34.692585 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 17 00:39:34.692632 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 17 00:39:34.692677 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:39:34.692724 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 17 00:39:34.692770 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 17 00:39:34.692841 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:39:34.692892 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 17 00:39:34.692939 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 17 00:39:34.692985 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:39:34.693031 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 17 00:39:34.693077 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 17 00:39:34.693123 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:39:34.693170 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 17 00:39:34.693217 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 17 00:39:34.693263 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 17 00:39:34.693311 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:39:34.693363 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 17 00:39:34.693432 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 17 00:39:34.693495 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 17 00:39:34.693569 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:39:34.693636 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 17 00:39:34.693701 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 17 00:39:34.693762 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 17 00:39:34.693944 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:39:34.693995 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 17 00:39:34.694046 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 17 00:39:34.694092 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:39:34.695313 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 17 00:39:34.695369 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 17 00:39:34.695418 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:39:34.695691 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 17 00:39:34.695744 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 17 00:39:34.695813 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:39:34.695864 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 17 00:39:34.695916 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 17 00:39:34.695986 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:39:34.696261 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 17 00:39:34.696332 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 17 00:39:34.696386 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:39:34.696720 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 17 00:39:34.696809 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 17 00:39:34.696865 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 17 00:39:34.696912 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:39:34.696984 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 17 00:39:34.702207 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 17 00:39:34.702277 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 17 00:39:34.702326 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:39:34.702376 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 17 00:39:34.702423 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 17 00:39:34.702470 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:39:34.702516 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 17 00:39:34.702563 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 17 00:39:34.702610 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:39:34.702663 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 17 00:39:34.702708 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 17 00:39:34.702754 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:39:34.703032 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 17 00:39:34.703088 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 17 00:39:34.703137 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:39:34.703193 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 17 00:39:34.703245 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 17 00:39:34.703293 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:39:34.703341 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 17 00:39:34.703391 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 17 00:39:34.703437 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:39:34.703484 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 17 00:39:34.703527 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 17 00:39:34.703569 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 17 00:39:34.703610 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 17 00:39:34.703651 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 17 00:39:34.703695 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 17 00:39:34.703741 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 17 00:39:34.703793 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:39:34.703843 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 17 00:39:34.703885 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 17 00:39:34.703928 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 17 00:39:34.703971 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 17 00:39:34.704012 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 17 00:39:34.704063 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 17 00:39:34.704107 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 17 00:39:34.704149 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:39:34.704197 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 17 00:39:34.704241 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 17 00:39:34.704284 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:39:34.704332 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 17 00:39:34.704379 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 17 00:39:34.704422 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:39:34.704471 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 17 00:39:34.704515 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:39:34.704562 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 17 00:39:34.704605 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:39:34.704654 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 17 00:39:34.704697 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:39:34.704744 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 17 00:39:34.704794 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:39:34.704841 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 17 00:39:34.704884 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:39:34.704934 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 17 00:39:34.704977 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 17 00:39:34.705018 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:39:34.705069 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 17 00:39:34.705112 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 17 00:39:34.705156 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:39:34.705211 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 17 00:39:34.705258 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 17 00:39:34.705300 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:39:34.705347 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 17 00:39:34.705389 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:39:34.705435 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 17 00:39:34.705478 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:39:34.705528 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 17 00:39:34.705571 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:39:34.705617 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 17 00:39:34.705661 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:39:34.705710 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 17 00:39:34.705753 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:39:34.705809 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 17 00:39:34.705853 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 17 00:39:34.705896 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:39:34.705943 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 17 00:39:34.705986 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 17 00:39:34.706028 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:39:34.706075 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 17 00:39:34.706120 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 17 00:39:34.706163 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:39:34.706210 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 17 00:39:34.706253 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:39:34.706300 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 17 00:39:34.706343 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:39:34.706392 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 17 00:39:34.706436 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:39:34.706484 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 17 00:39:34.706528 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:39:34.706574 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 17 00:39:34.706617 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:39:34.706664 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 17 00:39:34.706709 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 17 00:39:34.706751 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:39:34.707082 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 17 00:39:34.707133 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 17 00:39:34.707178 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:39:34.707225 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 17 00:39:34.707295 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:39:34.707561 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 17 00:39:34.707611 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:39:34.707663 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 17 00:39:34.707707 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:39:34.707756 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 17 00:39:34.707812 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:39:34.707859 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 17 00:39:34.707903 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:39:34.707949 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 17 00:39:34.708002 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:39:34.708055 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:39:34.708067 kernel: PCI: CLS 32 bytes, default 64 May 17 00:39:34.708074 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:39:34.708082 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 17 00:39:34.708088 kernel: clocksource: Switched to clocksource tsc May 17 00:39:34.708094 kernel: Initialise system trusted keyrings May 17 00:39:34.708101 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:39:34.708107 kernel: Key type asymmetric registered May 17 00:39:34.708113 kernel: Asymmetric key parser 'x509' registered May 17 00:39:34.708119 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:39:34.708127 kernel: io scheduler mq-deadline registered May 17 00:39:34.708134 kernel: io scheduler kyber registered May 17 00:39:34.708140 kernel: io scheduler bfq registered May 17 00:39:34.708189 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 17 00:39:34.708238 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708287 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 17 00:39:34.708335 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708383 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 17 00:39:34.708432 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708480 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 17 00:39:34.708527 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708575 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 17 00:39:34.708622 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708670 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 17 00:39:34.708718 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708767 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 17 00:39:34.708885 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.708933 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 17 00:39:34.708980 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.709030 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 17 00:39:34.709077 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.709316 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 17 00:39:34.709369 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.709419 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 17 00:39:34.709748 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.709827 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 17 00:39:34.709882 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.709932 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 17 00:39:34.710139 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.710192 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 17 00:39:34.710241 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.710292 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 17 00:39:34.710548 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.710607 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 17 00:39:34.710658 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.710707 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 17 00:39:34.710767 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.711161 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 17 00:39:34.711506 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.711561 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 17 00:39:34.711846 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.711902 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 17 00:39:34.711952 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712000 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 17 00:39:34.712063 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712113 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 17 00:39:34.712160 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712208 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 17 00:39:34.712255 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712306 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 17 00:39:34.712353 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712400 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 17 00:39:34.712447 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712494 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 17 00:39:34.712541 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712591 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 17 00:39:34.712638 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.712685 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 17 00:39:34.712730 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.713076 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 17 00:39:34.713137 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.713190 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 17 00:39:34.713239 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.713293 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 17 00:39:34.713340 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.713387 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 17 00:39:34.713437 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:39:34.713446 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:39:34.713453 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:39:34.713460 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:39:34.713466 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 17 00:39:34.713472 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:39:34.713479 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:39:34.713528 kernel: rtc_cmos 00:01: registered as rtc0 May 17 00:39:34.713571 kernel: rtc_cmos 00:01: setting system clock to 2025-05-17T00:39:34 UTC (1747442374) May 17 00:39:34.713581 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:39:34.713620 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 17 00:39:34.713629 kernel: intel_pstate: CPU model not supported May 17 00:39:34.713636 kernel: NET: Registered PF_INET6 protocol family May 17 00:39:34.713642 kernel: Segment Routing with IPv6 May 17 00:39:34.713648 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:39:34.713656 kernel: NET: Registered PF_PACKET protocol family May 17 00:39:34.713662 kernel: Key type dns_resolver registered May 17 00:39:34.713668 kernel: IPI shorthand broadcast: enabled May 17 00:39:34.713675 kernel: sched_clock: Marking stable (887467591, 221942938)->(1177167673, -67757144) May 17 00:39:34.713681 kernel: registered taskstats version 1 May 17 00:39:34.713687 kernel: Loading compiled-in X.509 certificates May 17 00:39:34.713694 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:39:34.713700 kernel: Key type .fscrypt registered May 17 00:39:34.713706 kernel: Key type fscrypt-provisioning registered May 17 00:39:34.713713 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:39:34.713719 kernel: ima: Allocated hash algorithm: sha1 May 17 00:39:34.713725 kernel: ima: No architecture policies found May 17 00:39:34.713732 kernel: clk: Disabling unused clocks May 17 00:39:34.713738 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:39:34.713744 kernel: Write protecting the kernel read-only data: 28672k May 17 00:39:34.713750 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:39:34.713756 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:39:34.713763 kernel: Run /init as init process May 17 00:39:34.713776 kernel: with arguments: May 17 00:39:34.713990 kernel: /init May 17 00:39:34.713997 kernel: with environment: May 17 00:39:34.714003 kernel: HOME=/ May 17 00:39:34.714009 kernel: TERM=linux May 17 00:39:34.714015 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:39:34.714023 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:39:34.714031 systemd[1]: Detected virtualization vmware. May 17 00:39:34.714040 systemd[1]: Detected architecture x86-64. May 17 00:39:34.714046 systemd[1]: Running in initrd. May 17 00:39:34.714053 systemd[1]: No hostname configured, using default hostname. May 17 00:39:34.714059 systemd[1]: Hostname set to . May 17 00:39:34.714066 systemd[1]: Initializing machine ID from random generator. May 17 00:39:34.714073 systemd[1]: Queued start job for default target initrd.target. May 17 00:39:34.714079 systemd[1]: Started systemd-ask-password-console.path. May 17 00:39:34.714085 systemd[1]: Reached target cryptsetup.target. May 17 00:39:34.714093 systemd[1]: Reached target paths.target. May 17 00:39:34.714099 systemd[1]: Reached target slices.target. May 17 00:39:34.714105 systemd[1]: Reached target swap.target. May 17 00:39:34.714112 systemd[1]: Reached target timers.target. May 17 00:39:34.714118 systemd[1]: Listening on iscsid.socket. May 17 00:39:34.714125 systemd[1]: Listening on iscsiuio.socket. May 17 00:39:34.714131 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:39:34.714139 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:39:34.714147 systemd[1]: Listening on systemd-journald.socket. May 17 00:39:34.714153 systemd[1]: Listening on systemd-networkd.socket. May 17 00:39:34.714160 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:39:34.714166 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:39:34.714173 systemd[1]: Reached target sockets.target. May 17 00:39:34.714180 systemd[1]: Starting kmod-static-nodes.service... May 17 00:39:34.714191 systemd[1]: Finished network-cleanup.service. May 17 00:39:34.714197 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:39:34.714204 systemd[1]: Starting systemd-journald.service... May 17 00:39:34.714212 systemd[1]: Starting systemd-modules-load.service... May 17 00:39:34.714218 systemd[1]: Starting systemd-resolved.service... May 17 00:39:34.714224 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:39:34.714231 systemd[1]: Finished kmod-static-nodes.service. May 17 00:39:34.714238 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:39:34.714244 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:39:34.714251 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:39:34.714257 kernel: audit: type=1130 audit(1747442374.665:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.714264 systemd[1]: Started systemd-resolved.service. May 17 00:39:34.714271 kernel: audit: type=1130 audit(1747442374.669:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.714278 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:39:34.714284 kernel: audit: type=1130 audit(1747442374.672:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.714291 systemd[1]: Reached target nss-lookup.target. May 17 00:39:34.714297 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:39:34.714304 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:39:34.714311 kernel: Bridge firewalling registered May 17 00:39:34.714317 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:39:34.714324 systemd[1]: Starting dracut-cmdline.service... May 17 00:39:34.714331 kernel: audit: type=1130 audit(1747442374.697:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.714337 kernel: SCSI subsystem initialized May 17 00:39:34.714347 systemd-journald[216]: Journal started May 17 00:39:34.714381 systemd-journald[216]: Runtime Journal (/run/log/journal/1e1067db156c44368f7bdb0eb41646ee) is 4.8M, max 38.8M, 34.0M free. May 17 00:39:34.717844 systemd[1]: Started systemd-journald.service. May 17 00:39:34.717861 kernel: audit: type=1130 audit(1747442374.714:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.717870 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:39:34.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.658502 systemd-resolved[218]: Positive Trust Anchors: May 17 00:39:34.719938 kernel: device-mapper: uevent: version 1.0.3 May 17 00:39:34.658507 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:39:34.658527 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:39:34.660112 systemd-resolved[218]: Defaulting to hostname 'linux'. May 17 00:39:34.660584 systemd-modules-load[217]: Inserted module 'overlay' May 17 00:39:34.690128 systemd-modules-load[217]: Inserted module 'br_netfilter' May 17 00:39:34.721204 dracut-cmdline[232]: dracut-dracut-053 May 17 00:39:34.721204 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 17 00:39:34.721204 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:39:34.723855 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:39:34.726092 systemd-modules-load[217]: Inserted module 'dm_multipath' May 17 00:39:34.726438 systemd[1]: Finished systemd-modules-load.service. May 17 00:39:34.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.726927 systemd[1]: Starting systemd-sysctl.service... May 17 00:39:34.732059 kernel: audit: type=1130 audit(1747442374.724:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.732857 systemd[1]: Finished systemd-sysctl.service. May 17 00:39:34.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.736082 kernel: audit: type=1130 audit(1747442374.731:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.757787 kernel: Loading iSCSI transport class v2.0-870. May 17 00:39:34.769787 kernel: iscsi: registered transport (tcp) May 17 00:39:34.784866 kernel: iscsi: registered transport (qla4xxx) May 17 00:39:34.784890 kernel: QLogic iSCSI HBA Driver May 17 00:39:34.801320 systemd[1]: Finished dracut-cmdline.service. May 17 00:39:34.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.801940 systemd[1]: Starting dracut-pre-udev.service... May 17 00:39:34.805007 kernel: audit: type=1130 audit(1747442374.799:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.839792 kernel: raid6: avx2x4 gen() 42287 MB/s May 17 00:39:34.856783 kernel: raid6: avx2x4 xor() 21336 MB/s May 17 00:39:34.873796 kernel: raid6: avx2x2 gen() 52372 MB/s May 17 00:39:34.890832 kernel: raid6: avx2x2 xor() 30057 MB/s May 17 00:39:34.907822 kernel: raid6: avx2x1 gen() 43781 MB/s May 17 00:39:34.924811 kernel: raid6: avx2x1 xor() 27153 MB/s May 17 00:39:34.941801 kernel: raid6: sse2x4 gen() 18643 MB/s May 17 00:39:34.958790 kernel: raid6: sse2x4 xor() 11301 MB/s May 17 00:39:34.975817 kernel: raid6: sse2x2 gen() 21032 MB/s May 17 00:39:34.992802 kernel: raid6: sse2x2 xor() 13196 MB/s May 17 00:39:35.009796 kernel: raid6: sse2x1 gen() 17677 MB/s May 17 00:39:35.026984 kernel: raid6: sse2x1 xor() 8885 MB/s May 17 00:39:35.027017 kernel: raid6: using algorithm avx2x2 gen() 52372 MB/s May 17 00:39:35.027025 kernel: raid6: .... xor() 30057 MB/s, rmw enabled May 17 00:39:35.028170 kernel: raid6: using avx2x2 recovery algorithm May 17 00:39:35.036788 kernel: xor: automatically using best checksumming function avx May 17 00:39:35.098821 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:39:35.103430 systemd[1]: Finished dracut-pre-udev.service. May 17 00:39:35.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.104096 systemd[1]: Starting systemd-udevd.service... May 17 00:39:35.102000 audit: BPF prog-id=7 op=LOAD May 17 00:39:35.102000 audit: BPF prog-id=8 op=LOAD May 17 00:39:35.106846 kernel: audit: type=1130 audit(1747442375.101:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.114427 systemd-udevd[414]: Using default interface naming scheme 'v252'. May 17 00:39:35.117331 systemd[1]: Started systemd-udevd.service. May 17 00:39:35.117880 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:39:35.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.125003 dracut-pre-trigger[418]: rd.md=0: removing MD RAID activation May 17 00:39:35.139897 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:39:35.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.140426 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:39:35.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.201435 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:39:35.257432 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 17 00:39:35.257470 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 17 00:39:35.274024 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 17 00:39:35.274036 kernel: vmw_pvscsi: using 64bit dma May 17 00:39:35.274044 kernel: vmw_pvscsi: max_id: 16 May 17 00:39:35.274051 kernel: vmw_pvscsi: setting ring_pages to 8 May 17 00:39:35.274058 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 17 00:39:35.285788 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 17 00:39:35.288789 kernel: vmw_pvscsi: enabling reqCallThreshold May 17 00:39:35.288834 kernel: vmw_pvscsi: driver-based request coalescing enabled May 17 00:39:35.288843 kernel: vmw_pvscsi: using MSI-X May 17 00:39:35.288854 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 17 00:39:35.288965 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 17 00:39:35.289047 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 17 00:39:35.289786 kernel: libata version 3.00 loaded. May 17 00:39:35.289801 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:39:35.305789 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:39:35.308997 kernel: ata_piix 0000:00:07.1: version 2.13 May 17 00:39:35.317040 kernel: AES CTR mode by8 optimization enabled May 17 00:39:35.317052 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 17 00:39:35.323202 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:39:35.323287 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 17 00:39:35.323355 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 17 00:39:35.323415 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 17 00:39:35.323477 kernel: scsi host1: ata_piix May 17 00:39:35.323561 kernel: scsi host2: ata_piix May 17 00:39:35.323621 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 17 00:39:35.323632 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 17 00:39:35.323639 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:39:35.323650 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:39:35.486852 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 17 00:39:35.492803 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 17 00:39:35.523836 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 17 00:39:35.543668 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:39:35.543680 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (466) May 17 00:39:35.543688 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 17 00:39:35.537349 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:39:35.543056 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:39:35.548684 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:39:35.556234 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:39:35.556372 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:39:35.557031 systemd[1]: Starting disk-uuid.service... May 17 00:39:35.588787 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:39:35.598346 kernel: GPT:disk_guids don't match. May 17 00:39:35.598376 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:39:35.598384 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:39:36.628785 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:39:36.628856 disk-uuid[548]: The operation has completed successfully. May 17 00:39:36.682197 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:39:36.682487 systemd[1]: Finished disk-uuid.service. May 17 00:39:36.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.683272 systemd[1]: Starting verity-setup.service... May 17 00:39:36.695818 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:39:36.753700 systemd[1]: Found device dev-mapper-usr.device. May 17 00:39:36.754256 systemd[1]: Mounting sysusr-usr.mount... May 17 00:39:36.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.754568 systemd[1]: Finished verity-setup.service. May 17 00:39:36.816651 systemd[1]: Mounted sysusr-usr.mount. May 17 00:39:36.816862 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:39:36.817238 systemd[1]: Starting afterburn-network-kargs.service... May 17 00:39:36.817697 systemd[1]: Starting ignition-setup.service... May 17 00:39:36.838150 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:39:36.838189 kernel: BTRFS info (device sda6): using free space tree May 17 00:39:36.838203 kernel: BTRFS info (device sda6): has skinny extents May 17 00:39:36.846789 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:39:36.855867 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:39:36.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.861176 systemd[1]: Finished ignition-setup.service. May 17 00:39:36.861782 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:39:36.938783 systemd[1]: Finished afterburn-network-kargs.service. May 17 00:39:36.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.939415 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:39:36.982103 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:39:36.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.980000 audit: BPF prog-id=9 op=LOAD May 17 00:39:36.983039 systemd[1]: Starting systemd-networkd.service... May 17 00:39:36.997666 systemd-networkd[734]: lo: Link UP May 17 00:39:36.997670 systemd-networkd[734]: lo: Gained carrier May 17 00:39:36.997949 systemd-networkd[734]: Enumeration completed May 17 00:39:36.998149 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 17 00:39:37.002093 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 17 00:39:37.002212 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 17 00:39:36.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.998692 systemd[1]: Started systemd-networkd.service. May 17 00:39:36.998861 systemd[1]: Reached target network.target. May 17 00:39:36.999377 systemd[1]: Starting iscsiuio.service... May 17 00:39:37.000742 systemd-networkd[734]: ens192: Link UP May 17 00:39:37.000745 systemd-networkd[734]: ens192: Gained carrier May 17 00:39:37.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.004532 systemd[1]: Started iscsiuio.service. May 17 00:39:37.005150 systemd[1]: Starting iscsid.service... May 17 00:39:37.007362 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:39:37.007362 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:39:37.007362 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:39:37.007362 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:39:37.007362 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:39:37.008305 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:39:37.008425 systemd[1]: Started iscsid.service. May 17 00:39:37.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.009035 systemd[1]: Starting dracut-initqueue.service... May 17 00:39:37.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.015578 systemd[1]: Finished dracut-initqueue.service. May 17 00:39:37.015730 systemd[1]: Reached target remote-fs-pre.target. May 17 00:39:37.015828 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:39:37.015981 systemd[1]: Reached target remote-fs.target. May 17 00:39:37.016831 systemd[1]: Starting dracut-pre-mount.service... May 17 00:39:37.021957 systemd[1]: Finished dracut-pre-mount.service. May 17 00:39:37.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.051847 ignition[606]: Ignition 2.14.0 May 17 00:39:37.052129 ignition[606]: Stage: fetch-offline May 17 00:39:37.052279 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:37.052439 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:39:37.108547 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:39:37.108854 ignition[606]: parsed url from cmdline: "" May 17 00:39:37.108895 ignition[606]: no config URL provided May 17 00:39:37.109012 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:39:37.109152 ignition[606]: no config at "/usr/lib/ignition/user.ign" May 17 00:39:37.124083 ignition[606]: config successfully fetched May 17 00:39:37.124119 ignition[606]: parsing config with SHA512: 55fc4573d413c1f469489758c914d24f8b7fb3caaea2c1048f9ebdcdc6de464f9a3853299f6c60183aa900a3d1f6c2de709e0a3ce3786fc2f8868b345696e4b5 May 17 00:39:37.127190 unknown[606]: fetched base config from "system" May 17 00:39:37.127200 unknown[606]: fetched user config from "vmware" May 17 00:39:37.127704 ignition[606]: fetch-offline: fetch-offline passed May 17 00:39:37.127786 ignition[606]: Ignition finished successfully May 17 00:39:37.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.128598 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:39:37.128784 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 00:39:37.129337 systemd[1]: Starting ignition-kargs.service... May 17 00:39:37.135455 ignition[754]: Ignition 2.14.0 May 17 00:39:37.135691 ignition[754]: Stage: kargs May 17 00:39:37.135896 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:37.136051 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:39:37.137445 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:39:37.139098 ignition[754]: kargs: kargs passed May 17 00:39:37.139146 ignition[754]: Ignition finished successfully May 17 00:39:37.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.140109 systemd[1]: Finished ignition-kargs.service. May 17 00:39:37.140687 systemd[1]: Starting ignition-disks.service... May 17 00:39:37.145359 ignition[760]: Ignition 2.14.0 May 17 00:39:37.145600 ignition[760]: Stage: disks May 17 00:39:37.145782 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:37.145940 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:39:37.147310 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:39:37.148728 ignition[760]: disks: disks passed May 17 00:39:37.148935 ignition[760]: Ignition finished successfully May 17 00:39:37.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.149576 systemd[1]: Finished ignition-disks.service. May 17 00:39:37.149730 systemd[1]: Reached target initrd-root-device.target. May 17 00:39:37.149830 systemd[1]: Reached target local-fs-pre.target. May 17 00:39:37.149913 systemd[1]: Reached target local-fs.target. May 17 00:39:37.149992 systemd[1]: Reached target sysinit.target. May 17 00:39:37.150070 systemd[1]: Reached target basic.target. May 17 00:39:37.150622 systemd[1]: Starting systemd-fsck-root.service... May 17 00:39:37.161614 systemd-fsck[768]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 17 00:39:37.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.163124 systemd[1]: Finished systemd-fsck-root.service. May 17 00:39:37.163679 systemd[1]: Mounting sysroot.mount... May 17 00:39:37.171329 systemd[1]: Mounted sysroot.mount. May 17 00:39:37.171594 systemd[1]: Reached target initrd-root-fs.target. May 17 00:39:37.171790 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:39:37.173098 systemd[1]: Mounting sysroot-usr.mount... May 17 00:39:37.173595 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:39:37.173792 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:39:37.173985 systemd[1]: Reached target ignition-diskful.target. May 17 00:39:37.174937 systemd[1]: Mounted sysroot-usr.mount. May 17 00:39:37.175546 systemd[1]: Starting initrd-setup-root.service... May 17 00:39:37.178475 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:39:37.181579 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory May 17 00:39:37.183966 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:39:37.186389 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:39:37.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.217397 systemd[1]: Finished initrd-setup-root.service. May 17 00:39:37.217980 systemd[1]: Starting ignition-mount.service... May 17 00:39:37.218444 systemd[1]: Starting sysroot-boot.service... May 17 00:39:37.222860 bash[819]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:39:37.228490 ignition[820]: INFO : Ignition 2.14.0 May 17 00:39:37.228744 ignition[820]: INFO : Stage: mount May 17 00:39:37.228982 ignition[820]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:37.229141 ignition[820]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:39:37.230750 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:39:37.233071 ignition[820]: INFO : mount: mount passed May 17 00:39:37.233182 ignition[820]: INFO : Ignition finished successfully May 17 00:39:37.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.233722 systemd[1]: Finished ignition-mount.service. May 17 00:39:37.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.242082 systemd[1]: Finished sysroot-boot.service. May 17 00:39:37.778393 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:39:37.790380 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (829) May 17 00:39:37.790424 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:39:37.790433 kernel: BTRFS info (device sda6): using free space tree May 17 00:39:37.792682 kernel: BTRFS info (device sda6): has skinny extents May 17 00:39:37.796788 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:39:37.798270 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:39:37.799095 systemd[1]: Starting ignition-files.service... May 17 00:39:37.812352 ignition[849]: INFO : Ignition 2.14.0 May 17 00:39:37.812352 ignition[849]: INFO : Stage: files May 17 00:39:37.812725 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:37.812725 ignition[849]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:39:37.814652 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:39:37.826735 ignition[849]: DEBUG : files: compiled without relabeling support, skipping May 17 00:39:37.831934 ignition[849]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:39:37.831934 ignition[849]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:39:37.857068 ignition[849]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:39:37.857371 ignition[849]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:39:37.867347 unknown[849]: wrote ssh authorized keys file for user: core May 17 00:39:37.867925 ignition[849]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:39:37.871803 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:39:37.871803 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 May 17 00:39:37.978502 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:39:38.116413 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:39:38.116758 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:39:38.117155 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:39:38.117353 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:39:38.117624 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:39:38.117824 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:39:38.118061 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:39:38.118257 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:39:38.118496 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:39:38.123423 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:39:38.123730 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:39:38.123953 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:39:38.124215 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:39:38.132440 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 17 00:39:38.132742 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:39:38.153469 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2024561017" May 17 00:39:38.153717 ignition[849]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2024561017": device or resource busy May 17 00:39:38.153717 ignition[849]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2024561017", trying btrfs: device or resource busy May 17 00:39:38.153717 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2024561017" May 17 00:39:38.153717 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2024561017" May 17 00:39:38.167978 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2024561017" May 17 00:39:38.168872 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2024561017" May 17 00:39:38.169153 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 17 00:39:38.169158 systemd[1]: mnt-oem2024561017.mount: Deactivated successfully. May 17 00:39:38.169826 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:39:38.170140 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:39:38.849494 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:39:38.995051 systemd-networkd[734]: ens192: Gained IPv6LL May 17 00:39:39.094527 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:39:39.095293 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 17 00:39:39.095579 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 17 00:39:39.095798 ignition[849]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 17 00:39:39.095941 ignition[849]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 17 00:39:39.096086 ignition[849]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 17 00:39:39.096255 ignition[849]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:39:39.096657 ignition[849]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:39:39.096865 ignition[849]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 17 00:39:39.097013 ignition[849]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 17 00:39:39.097180 ignition[849]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:39:39.097435 ignition[849]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:39:39.097636 ignition[849]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 17 00:39:39.097794 ignition[849]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" May 17 00:39:39.097999 ignition[849]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" May 17 00:39:39.098152 ignition[849]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" May 17 00:39:39.098321 ignition[849]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:39:39.098475 ignition[849]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" May 17 00:39:39.098631 ignition[849]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:39:39.181402 ignition[849]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:39:39.181666 ignition[849]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" May 17 00:39:39.181944 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:39:39.182208 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:39:39.182419 ignition[849]: INFO : files: files passed May 17 00:39:39.182566 ignition[849]: INFO : Ignition finished successfully May 17 00:39:39.183660 systemd[1]: Finished ignition-files.service. May 17 00:39:39.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.184651 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:39:39.187763 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 00:39:39.187811 kernel: audit: type=1130 audit(1747442379.182:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.187271 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:39:39.188136 systemd[1]: Starting ignition-quench.service... May 17 00:39:39.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.193806 kernel: audit: type=1130 audit(1747442379.189:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.191040 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:39:39.193991 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:39:39.191117 systemd[1]: Finished ignition-quench.service. May 17 00:39:39.194554 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:39:39.194706 systemd[1]: Reached target ignition-complete.target. May 17 00:39:39.195316 systemd[1]: Starting initrd-parse-etc.service... May 17 00:39:39.198888 kernel: audit: type=1131 audit(1747442379.189:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.201827 kernel: audit: type=1130 audit(1747442379.192:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.205068 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:39:39.205341 systemd[1]: Finished initrd-parse-etc.service. May 17 00:39:39.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.205707 systemd[1]: Reached target initrd-fs.target. May 17 00:39:39.210742 kernel: audit: type=1130 audit(1747442379.203:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.210763 kernel: audit: type=1131 audit(1747442379.203:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.211020 systemd[1]: Reached target initrd.target. May 17 00:39:39.211281 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:39:39.212026 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:39:39.220249 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:39:39.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.221129 systemd[1]: Starting initrd-cleanup.service... May 17 00:39:39.223972 kernel: audit: type=1130 audit(1747442379.218:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.228887 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:39:39.228946 systemd[1]: Finished initrd-cleanup.service. May 17 00:39:39.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.229624 systemd[1]: Stopped target nss-lookup.target. May 17 00:39:39.234458 kernel: audit: type=1130 audit(1747442379.227:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.234477 kernel: audit: type=1131 audit(1747442379.227:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.234518 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:39:39.234651 systemd[1]: Stopped target timers.target. May 17 00:39:39.234868 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:39:39.237658 kernel: audit: type=1131 audit(1747442379.233:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.234910 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:39:39.235083 systemd[1]: Stopped target initrd.target. May 17 00:39:39.237746 systemd[1]: Stopped target basic.target. May 17 00:39:39.237938 systemd[1]: Stopped target ignition-complete.target. May 17 00:39:39.238114 systemd[1]: Stopped target ignition-diskful.target. May 17 00:39:39.238287 systemd[1]: Stopped target initrd-root-device.target. May 17 00:39:39.238467 systemd[1]: Stopped target remote-fs.target. May 17 00:39:39.238628 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:39:39.238830 systemd[1]: Stopped target sysinit.target. May 17 00:39:39.238984 systemd[1]: Stopped target local-fs.target. May 17 00:39:39.239146 systemd[1]: Stopped target local-fs-pre.target. May 17 00:39:39.239312 systemd[1]: Stopped target swap.target. May 17 00:39:39.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.239478 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:39:39.239517 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:39:39.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.239675 systemd[1]: Stopped target cryptsetup.target. May 17 00:39:39.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.239807 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:39:39.239831 systemd[1]: Stopped dracut-initqueue.service. May 17 00:39:39.240007 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:39:39.240029 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:39:39.240170 systemd[1]: Stopped target paths.target. May 17 00:39:39.240333 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:39:39.245813 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:39:39.246031 systemd[1]: Stopped target slices.target. May 17 00:39:39.246136 systemd[1]: Stopped target sockets.target. May 17 00:39:39.246323 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:39:39.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.246359 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:39:39.246505 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:39:39.246527 systemd[1]: Stopped ignition-files.service. May 17 00:39:39.247194 systemd[1]: Stopping ignition-mount.service... May 17 00:39:39.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.255945 iscsid[739]: iscsid shutting down. May 17 00:39:39.249084 systemd[1]: Stopping iscsid.service... May 17 00:39:39.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.256548 ignition[888]: INFO : Ignition 2.14.0 May 17 00:39:39.256548 ignition[888]: INFO : Stage: umount May 17 00:39:39.256548 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:39.256548 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:39:39.256548 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:39:39.249713 systemd[1]: Stopping sysroot-boot.service... May 17 00:39:39.249852 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:39:39.249895 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:39:39.250035 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:39:39.250056 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:39:39.250342 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:39:39.250409 systemd[1]: Stopped iscsid.service. May 17 00:39:39.250558 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:39:39.250578 systemd[1]: Closed iscsid.socket. May 17 00:39:39.255544 systemd[1]: Stopping iscsiuio.service... May 17 00:39:39.255795 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:39:39.255889 systemd[1]: Stopped iscsiuio.service. May 17 00:39:39.256079 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:39:39.256099 systemd[1]: Closed iscsiuio.socket. May 17 00:39:39.259799 ignition[888]: INFO : umount: umount passed May 17 00:39:39.259936 ignition[888]: INFO : Ignition finished successfully May 17 00:39:39.260574 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:39:39.260653 systemd[1]: Stopped ignition-mount.service. May 17 00:39:39.260886 systemd[1]: Stopped target network.target. May 17 00:39:39.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.260990 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:39:39.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.261015 systemd[1]: Stopped ignition-disks.service. May 17 00:39:39.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.261485 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:39:39.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.261517 systemd[1]: Stopped ignition-kargs.service. May 17 00:39:39.261677 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:39:39.261708 systemd[1]: Stopped ignition-setup.service. May 17 00:39:39.262206 systemd[1]: Stopping systemd-networkd.service... May 17 00:39:39.262466 systemd[1]: Stopping systemd-resolved.service... May 17 00:39:39.267492 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:39:39.267557 systemd[1]: Stopped systemd-networkd.service. May 17 00:39:39.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.268093 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:39:39.268116 systemd[1]: Closed systemd-networkd.socket. May 17 00:39:39.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.269000 audit: BPF prog-id=9 op=UNLOAD May 17 00:39:39.269056 systemd[1]: Stopping network-cleanup.service... May 17 00:39:39.269164 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:39:39.269201 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:39:39.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.269356 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 17 00:39:39.269378 systemd[1]: Stopped afterburn-network-kargs.service. May 17 00:39:39.269498 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:39:39.269520 systemd[1]: Stopped systemd-sysctl.service. May 17 00:39:39.269675 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:39:39.269696 systemd[1]: Stopped systemd-modules-load.service. May 17 00:39:39.269857 systemd[1]: Stopping systemd-udevd.service... May 17 00:39:39.272561 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:39:39.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.272611 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:39:39.274000 audit: BPF prog-id=6 op=UNLOAD May 17 00:39:39.273040 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:39:39.273092 systemd[1]: Stopped systemd-resolved.service. May 17 00:39:39.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.275450 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:39:39.275540 systemd[1]: Stopped systemd-udevd.service. May 17 00:39:39.276004 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:39:39.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.276054 systemd[1]: Stopped network-cleanup.service. May 17 00:39:39.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.276305 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:39:39.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.276323 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:39:39.276438 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:39:39.276455 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:39:39.276629 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:39:39.276652 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:39:39.276824 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:39:39.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.276843 systemd[1]: Stopped dracut-cmdline.service. May 17 00:39:39.277019 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:39:39.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.277038 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:39:39.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.277520 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:39:39.277704 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:39:39.277731 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:39:39.278089 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:39:39.278110 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:39:39.278301 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:39:39.278321 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:39:39.279152 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:39:39.282516 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:39:39.282572 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:39:39.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.479156 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:39:39.479217 systemd[1]: Stopped sysroot-boot.service. May 17 00:39:39.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.479525 systemd[1]: Reached target initrd-switch-root.target. May 17 00:39:39.479621 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:39:39.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.479646 systemd[1]: Stopped initrd-setup-root.service. May 17 00:39:39.480194 systemd[1]: Starting initrd-switch-root.service... May 17 00:39:39.486635 systemd[1]: Switching root. May 17 00:39:39.498765 systemd-journald[216]: Journal stopped May 17 00:39:41.962928 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). May 17 00:39:41.962948 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:39:41.962956 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:39:41.962962 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:39:41.962967 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:39:41.962974 kernel: SELinux: policy capability open_perms=1 May 17 00:39:41.962980 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:39:41.962986 kernel: SELinux: policy capability always_check_network=0 May 17 00:39:41.962991 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:39:41.962997 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:39:41.963002 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:39:41.963008 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:39:41.963015 systemd[1]: Successfully loaded SELinux policy in 38.966ms. May 17 00:39:41.963022 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.809ms. May 17 00:39:41.963030 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:39:41.963037 systemd[1]: Detected virtualization vmware. May 17 00:39:41.963044 systemd[1]: Detected architecture x86-64. May 17 00:39:41.963051 systemd[1]: Detected first boot. May 17 00:39:41.963058 systemd[1]: Initializing machine ID from random generator. May 17 00:39:41.963064 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:39:41.963070 systemd[1]: Populated /etc with preset unit settings. May 17 00:39:41.963125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:39:41.963139 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:39:41.963151 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:39:41.963163 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:39:41.963170 systemd[1]: Stopped initrd-switch-root.service. May 17 00:39:41.963176 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:39:41.963183 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:39:41.963189 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:39:41.963196 systemd[1]: Created slice system-getty.slice. May 17 00:39:41.963202 systemd[1]: Created slice system-modprobe.slice. May 17 00:39:41.963210 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:39:41.963216 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:39:41.963222 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:39:41.963229 systemd[1]: Created slice user.slice. May 17 00:39:41.963235 systemd[1]: Started systemd-ask-password-console.path. May 17 00:39:41.963242 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:39:41.963248 systemd[1]: Set up automount boot.automount. May 17 00:39:41.963255 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:39:41.963262 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:39:41.963271 systemd[1]: Stopped target initrd-fs.target. May 17 00:39:41.963278 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:39:41.963285 systemd[1]: Reached target integritysetup.target. May 17 00:39:41.963292 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:39:41.963298 systemd[1]: Reached target remote-fs.target. May 17 00:39:41.963305 systemd[1]: Reached target slices.target. May 17 00:39:41.963311 systemd[1]: Reached target swap.target. May 17 00:39:41.963318 systemd[1]: Reached target torcx.target. May 17 00:39:41.963325 systemd[1]: Reached target veritysetup.target. May 17 00:39:41.963332 systemd[1]: Listening on systemd-coredump.socket. May 17 00:39:41.963338 systemd[1]: Listening on systemd-initctl.socket. May 17 00:39:41.963345 systemd[1]: Listening on systemd-networkd.socket. May 17 00:39:41.963352 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:39:41.963359 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:39:41.963367 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:39:41.963374 systemd[1]: Mounting dev-hugepages.mount... May 17 00:39:41.963381 systemd[1]: Mounting dev-mqueue.mount... May 17 00:39:41.963388 systemd[1]: Mounting media.mount... May 17 00:39:41.963395 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:41.963401 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:39:41.963408 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:39:41.963415 systemd[1]: Mounting tmp.mount... May 17 00:39:41.963422 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:39:41.963429 systemd[1]: Starting ignition-delete-config.service... May 17 00:39:41.963435 systemd[1]: Starting kmod-static-nodes.service... May 17 00:39:41.963442 systemd[1]: Starting modprobe@configfs.service... May 17 00:39:41.963449 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:41.963455 systemd[1]: Starting modprobe@drm.service... May 17 00:39:41.963462 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:41.963469 systemd[1]: Starting modprobe@fuse.service... May 17 00:39:41.963477 systemd[1]: Starting modprobe@loop.service... May 17 00:39:41.963484 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:39:41.963491 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:39:41.963498 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:39:41.963505 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:39:41.963512 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:39:41.963520 systemd[1]: Stopped systemd-journald.service. May 17 00:39:41.963527 systemd[1]: Starting systemd-journald.service... May 17 00:39:41.963533 kernel: loop: module loaded May 17 00:39:41.963541 kernel: fuse: init (API version 7.34) May 17 00:39:41.963547 systemd[1]: Starting systemd-modules-load.service... May 17 00:39:41.963554 systemd[1]: Starting systemd-network-generator.service... May 17 00:39:41.963561 systemd[1]: Starting systemd-remount-fs.service... May 17 00:39:41.963567 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:39:41.963574 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:39:41.963581 systemd[1]: Stopped verity-setup.service. May 17 00:39:41.963587 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:41.963595 systemd[1]: Mounted dev-hugepages.mount. May 17 00:39:41.963602 systemd[1]: Mounted dev-mqueue.mount. May 17 00:39:41.963608 systemd[1]: Mounted media.mount. May 17 00:39:41.963615 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:39:41.963621 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:39:41.963628 systemd[1]: Mounted tmp.mount. May 17 00:39:41.963636 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:39:41.963643 systemd[1]: Finished kmod-static-nodes.service. May 17 00:39:41.963650 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:39:41.963657 systemd[1]: Finished modprobe@configfs.service. May 17 00:39:41.963665 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:41.963672 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:41.963678 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:39:41.963685 systemd[1]: Finished modprobe@drm.service. May 17 00:39:41.963691 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:41.963698 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:41.963705 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:39:41.963712 systemd[1]: Finished modprobe@fuse.service. May 17 00:39:41.963719 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:41.963726 systemd[1]: Finished modprobe@loop.service. May 17 00:39:41.963732 systemd[1]: Finished systemd-network-generator.service. May 17 00:39:41.963739 systemd[1]: Finished systemd-remount-fs.service. May 17 00:39:41.963746 systemd[1]: Reached target network-pre.target. May 17 00:39:41.963755 systemd-journald[1017]: Journal started May 17 00:39:41.963796 systemd-journald[1017]: Runtime Journal (/run/log/journal/407509b78a0544998d44876e4a51d40f) is 4.8M, max 38.8M, 34.0M free. May 17 00:39:39.748000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:39:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:39:39.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:39:39.798000 audit: BPF prog-id=10 op=LOAD May 17 00:39:39.798000 audit: BPF prog-id=10 op=UNLOAD May 17 00:39:39.798000 audit: BPF prog-id=11 op=LOAD May 17 00:39:39.798000 audit: BPF prog-id=11 op=UNLOAD May 17 00:39:39.942000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:39:39.942000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:39.942000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:39:39.944000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:39:39.944000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:39.944000 audit: CWD cwd="/" May 17 00:39:39.944000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:39.944000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:39.944000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:39:41.836000 audit: BPF prog-id=12 op=LOAD May 17 00:39:41.836000 audit: BPF prog-id=3 op=UNLOAD May 17 00:39:41.836000 audit: BPF prog-id=13 op=LOAD May 17 00:39:41.836000 audit: BPF prog-id=14 op=LOAD May 17 00:39:41.836000 audit: BPF prog-id=4 op=UNLOAD May 17 00:39:41.836000 audit: BPF prog-id=5 op=UNLOAD May 17 00:39:41.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.843000 audit: BPF prog-id=12 op=UNLOAD May 17 00:39:41.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.907000 audit: BPF prog-id=15 op=LOAD May 17 00:39:41.907000 audit: BPF prog-id=16 op=LOAD May 17 00:39:41.907000 audit: BPF prog-id=17 op=LOAD May 17 00:39:41.907000 audit: BPF prog-id=13 op=UNLOAD May 17 00:39:41.907000 audit: BPF prog-id=14 op=UNLOAD May 17 00:39:41.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.960000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:39:41.960000 audit[1017]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff12628ce0 a2=4000 a3=7fff12628d7c items=0 ppid=1 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.960000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:39:41.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.836126 systemd[1]: Queued start job for default target multi-user.target. May 17 00:39:39.940157 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:39:41.836135 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:39:39.940696 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:39:41.838839 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:39:39.940709 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:39:39.940729 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:39:39.940735 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:39:39.940755 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:39:39.940762 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:39:39.940924 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:39:41.966279 jq[988]: true May 17 00:39:39.940947 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:39:39.940956 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:39:39.942898 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:39:39.942931 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:39:39.942956 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:39:39.942964 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:39:39.942975 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:39:39.942982 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:39:41.966783 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:39:41.591340 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.591567 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.591681 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.591895 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.966985 jq[1034]: true May 17 00:39:41.592046 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:39:41.592261 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-17T00:39:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:39:41.970150 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:39:41.970171 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:39:41.987796 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:39:41.989808 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:41.992239 systemd[1]: Starting systemd-random-seed.service... May 17 00:39:41.992263 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:41.994410 systemd[1]: Starting systemd-sysusers.service... May 17 00:39:41.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.996372 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:39:41.996509 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:39:41.996784 systemd[1]: Started systemd-journald.service. May 17 00:39:41.997805 systemd[1]: Starting systemd-journal-flush.service... May 17 00:39:42.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.020114 systemd-journald[1017]: Time spent on flushing to /var/log/journal/407509b78a0544998d44876e4a51d40f is 30.085ms for 1997 entries. May 17 00:39:42.020114 systemd-journald[1017]: System Journal (/var/log/journal/407509b78a0544998d44876e4a51d40f) is 8.0M, max 584.8M, 576.8M free. May 17 00:39:42.102563 systemd-journald[1017]: Received client request to flush runtime journal. May 17 00:39:42.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.013883 systemd[1]: Finished systemd-modules-load.service. May 17 00:39:42.014845 systemd[1]: Starting systemd-sysctl.service... May 17 00:39:42.029634 systemd[1]: Finished systemd-random-seed.service. May 17 00:39:42.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.029816 systemd[1]: Reached target first-boot-complete.target. May 17 00:39:42.103180 systemd[1]: Finished systemd-journal-flush.service. May 17 00:39:42.117869 systemd[1]: Finished systemd-sysctl.service. May 17 00:39:42.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.118553 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:39:42.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.119559 systemd[1]: Starting systemd-udev-settle.service... May 17 00:39:42.127123 udevadm[1047]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:39:42.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.151972 systemd[1]: Finished systemd-sysusers.service. May 17 00:39:42.152946 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:39:42.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.259931 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:39:42.300464 ignition[1035]: Ignition 2.14.0 May 17 00:39:42.300941 ignition[1035]: deleting config from guestinfo properties May 17 00:39:42.304272 ignition[1035]: Successfully deleted config May 17 00:39:42.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.305217 systemd[1]: Finished ignition-delete-config.service. May 17 00:39:42.580649 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:39:42.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.579000 audit: BPF prog-id=18 op=LOAD May 17 00:39:42.579000 audit: BPF prog-id=19 op=LOAD May 17 00:39:42.579000 audit: BPF prog-id=7 op=UNLOAD May 17 00:39:42.579000 audit: BPF prog-id=8 op=UNLOAD May 17 00:39:42.581919 systemd[1]: Starting systemd-udevd.service... May 17 00:39:42.595354 systemd-udevd[1055]: Using default interface naming scheme 'v252'. May 17 00:39:42.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.617000 audit: BPF prog-id=20 op=LOAD May 17 00:39:42.617680 systemd[1]: Started systemd-udevd.service. May 17 00:39:42.619606 systemd[1]: Starting systemd-networkd.service... May 17 00:39:42.629000 audit: BPF prog-id=21 op=LOAD May 17 00:39:42.629000 audit: BPF prog-id=22 op=LOAD May 17 00:39:42.629000 audit: BPF prog-id=23 op=LOAD May 17 00:39:42.632037 systemd[1]: Starting systemd-userdbd.service... May 17 00:39:42.646182 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:39:42.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.664870 systemd[1]: Started systemd-userdbd.service. May 17 00:39:42.675786 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:39:42.691817 kernel: ACPI: button: Power Button [PWRF] May 17 00:39:42.730159 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:39:42.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.738163 systemd-networkd[1066]: lo: Link UP May 17 00:39:42.738171 systemd-networkd[1066]: lo: Gained carrier May 17 00:39:42.738590 systemd-networkd[1066]: Enumeration completed May 17 00:39:42.738668 systemd[1]: Started systemd-networkd.service. May 17 00:39:42.739299 systemd-networkd[1066]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 17 00:39:42.743142 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 17 00:39:42.743314 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 17 00:39:42.743782 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 17 00:39:42.744836 systemd-networkd[1066]: ens192: Link UP May 17 00:39:42.745069 systemd-networkd[1066]: ens192: Gained carrier May 17 00:39:42.771000 audit[1056]: AVC avc: denied { confidentiality } for pid=1056 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:39:42.771000 audit[1056]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c3ab5a49e0 a1=338ac a2=7f6999bcdbc5 a3=5 items=110 ppid=1055 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:42.771000 audit: CWD cwd="/" May 17 00:39:42.771000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=1 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=2 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=3 name=(null) inode=16253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=4 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=5 name=(null) inode=16254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=6 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=7 name=(null) inode=16255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=8 name=(null) inode=16255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=9 name=(null) inode=16256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=10 name=(null) inode=16255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=11 name=(null) inode=16257 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=12 name=(null) inode=16255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=13 name=(null) inode=16258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=14 name=(null) inode=16255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=15 name=(null) inode=16259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=16 name=(null) inode=16255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=17 name=(null) inode=16260 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=18 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=19 name=(null) inode=16261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=20 name=(null) inode=16261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=21 name=(null) inode=16262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=22 name=(null) inode=16261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=23 name=(null) inode=16263 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=24 name=(null) inode=16261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=25 name=(null) inode=16264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=26 name=(null) inode=16261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=27 name=(null) inode=16265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=28 name=(null) inode=16261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=29 name=(null) inode=16266 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=30 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=31 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=32 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=33 name=(null) inode=16268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=34 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=35 name=(null) inode=16269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=36 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=37 name=(null) inode=16270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=38 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=39 name=(null) inode=16271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=40 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=41 name=(null) inode=16272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=42 name=(null) inode=16252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=43 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=44 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=45 name=(null) inode=16274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=46 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=47 name=(null) inode=16275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=48 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=49 name=(null) inode=16276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=50 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=51 name=(null) inode=16277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=52 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=53 name=(null) inode=16278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=55 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=56 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=57 name=(null) inode=16280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=58 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=59 name=(null) inode=16281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=60 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=61 name=(null) inode=16282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=62 name=(null) inode=16282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=63 name=(null) inode=16283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=64 name=(null) inode=16282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=65 name=(null) inode=16284 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=66 name=(null) inode=16282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=67 name=(null) inode=16285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=68 name=(null) inode=16282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=69 name=(null) inode=16286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=70 name=(null) inode=16282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=71 name=(null) inode=16287 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=72 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=73 name=(null) inode=16288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=74 name=(null) inode=16288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=75 name=(null) inode=16289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=76 name=(null) inode=16288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=77 name=(null) inode=16290 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=78 name=(null) inode=16288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=79 name=(null) inode=16291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=80 name=(null) inode=16288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=81 name=(null) inode=16292 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=82 name=(null) inode=16288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=83 name=(null) inode=16293 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=84 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=85 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=86 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=87 name=(null) inode=16295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=88 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=89 name=(null) inode=16296 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=90 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=91 name=(null) inode=16297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=92 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=93 name=(null) inode=16298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=94 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=95 name=(null) inode=16299 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=96 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=97 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=98 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=99 name=(null) inode=16301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=100 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=101 name=(null) inode=16302 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=102 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=103 name=(null) inode=16303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=104 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=105 name=(null) inode=16304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=106 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=107 name=(null) inode=16305 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PATH item=109 name=(null) inode=16306 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.771000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:39:42.787789 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 17 00:39:42.792929 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 17 00:39:42.793026 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 17 00:39:42.793783 kernel: Guest personality initialized and is active May 17 00:39:42.795272 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 17 00:39:42.795327 kernel: Initialized host personality May 17 00:39:42.798801 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:39:42.821787 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:39:42.829578 (udev-worker)[1071]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 17 00:39:42.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.847516 systemd[1]: Finished systemd-udev-settle.service. May 17 00:39:42.848830 systemd[1]: Starting lvm2-activation-early.service... May 17 00:39:42.911186 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:39:42.934519 systemd[1]: Finished lvm2-activation-early.service. May 17 00:39:42.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.934731 systemd[1]: Reached target cryptsetup.target. May 17 00:39:42.935892 systemd[1]: Starting lvm2-activation.service... May 17 00:39:42.938682 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:39:42.960517 systemd[1]: Finished lvm2-activation.service. May 17 00:39:42.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.960799 systemd[1]: Reached target local-fs-pre.target. May 17 00:39:42.960987 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:39:42.961015 systemd[1]: Reached target local-fs.target. May 17 00:39:42.961109 systemd[1]: Reached target machines.target. May 17 00:39:42.962247 systemd[1]: Starting ldconfig.service... May 17 00:39:42.962833 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:42.962866 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:42.964053 systemd[1]: Starting systemd-boot-update.service... May 17 00:39:42.965366 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:39:42.967855 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:39:42.969131 systemd[1]: Starting systemd-sysext.service... May 17 00:39:42.971735 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) May 17 00:39:42.973054 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:39:42.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.979417 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:39:42.988016 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:39:43.002838 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:39:43.002999 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:39:43.029791 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:39:43.651704 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:39:43.652085 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:39:43.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.864792 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:39:44.010790 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:39:44.111694 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) May 17 00:39:44.111694 systemd-fsck[1101]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:39:44.112673 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:39:44.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.113708 systemd[1]: Mounting boot.mount... May 17 00:39:44.205203 systemd[1]: Mounted boot.mount. May 17 00:39:44.373016 systemd[1]: Finished systemd-boot-update.service. May 17 00:39:44.373893 kernel: kauditd_printk_skb: 229 callbacks suppressed May 17 00:39:44.373936 kernel: audit: type=1130 audit(1747442384.371:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.478282 (sd-sysext)[1106]: Using extensions 'kubernetes'. May 17 00:39:44.478557 (sd-sysext)[1106]: Merged extensions into '/usr'. May 17 00:39:44.512854 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.513899 systemd[1]: Mounting usr-share-oem.mount... May 17 00:39:44.514837 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:44.516467 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:44.517283 systemd[1]: Starting modprobe@loop.service... May 17 00:39:44.517733 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:44.517824 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:44.517886 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.519659 systemd[1]: Mounted usr-share-oem.mount. May 17 00:39:44.519956 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:44.520057 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:44.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.520391 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:44.520455 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:44.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.525641 kernel: audit: type=1130 audit(1747442384.518:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.525674 kernel: audit: type=1131 audit(1747442384.518:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.526211 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:44.526339 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.531162 kernel: audit: type=1130 audit(1747442384.524:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.531189 kernel: audit: type=1131 audit(1747442384.524:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.532109 systemd[1]: Finished systemd-sysext.service. May 17 00:39:44.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.536874 kernel: audit: type=1130 audit(1747442384.530:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.536904 kernel: audit: type=1131 audit(1747442384.530:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.541309 kernel: audit: type=1130 audit(1747442384.535:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.539003 systemd[1]: Starting ensure-sysext.service... May 17 00:39:44.539865 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.539897 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.540605 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:39:44.544408 systemd[1]: Reloading. May 17 00:39:44.564838 systemd-networkd[1066]: ens192: Gained IPv6LL May 17 00:39:44.578164 /usr/lib/systemd/system-generators/torcx-generator[1133]: time="2025-05-17T00:39:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:39:44.578366 /usr/lib/systemd/system-generators/torcx-generator[1133]: time="2025-05-17T00:39:44Z" level=info msg="torcx already run" May 17 00:39:44.583642 systemd-tmpfiles[1114]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:39:44.592611 systemd-tmpfiles[1114]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:39:44.609416 systemd-tmpfiles[1114]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:39:44.645966 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:39:44.646156 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:39:44.659008 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:39:44.694000 audit: BPF prog-id=24 op=LOAD May 17 00:39:44.698503 kernel: audit: type=1334 audit(1747442384.694:160): prog-id=24 op=LOAD May 17 00:39:44.698539 kernel: audit: type=1334 audit(1747442384.696:161): prog-id=20 op=UNLOAD May 17 00:39:44.696000 audit: BPF prog-id=20 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=25 op=LOAD May 17 00:39:44.697000 audit: BPF prog-id=15 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=26 op=LOAD May 17 00:39:44.697000 audit: BPF prog-id=27 op=LOAD May 17 00:39:44.697000 audit: BPF prog-id=16 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=17 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=28 op=LOAD May 17 00:39:44.697000 audit: BPF prog-id=29 op=LOAD May 17 00:39:44.697000 audit: BPF prog-id=18 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=19 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=30 op=LOAD May 17 00:39:44.697000 audit: BPF prog-id=21 op=UNLOAD May 17 00:39:44.697000 audit: BPF prog-id=31 op=LOAD May 17 00:39:44.698000 audit: BPF prog-id=32 op=LOAD May 17 00:39:44.698000 audit: BPF prog-id=22 op=UNLOAD May 17 00:39:44.698000 audit: BPF prog-id=23 op=UNLOAD May 17 00:39:44.706614 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.707553 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:44.709133 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:44.709980 systemd[1]: Starting modprobe@loop.service... May 17 00:39:44.710476 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:44.710568 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:44.710658 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.711201 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:44.711290 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:44.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.711878 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:44.711958 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:44.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.712290 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:44.712366 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.712654 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.712717 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.713717 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.714580 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:44.715357 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:44.716670 systemd[1]: Starting modprobe@loop.service... May 17 00:39:44.717171 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:44.717272 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:44.717358 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.717899 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:44.717979 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:44.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.718299 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:44.718381 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:44.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.718693 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:44.718767 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.719097 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.719170 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.722157 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.723257 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:44.724194 systemd[1]: Starting modprobe@drm.service... May 17 00:39:44.725306 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:44.727209 systemd[1]: Starting modprobe@loop.service... May 17 00:39:44.727385 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:44.727465 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:44.728483 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:39:44.729054 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:44.729804 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:44.729891 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:44.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.730232 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:39:44.730307 systemd[1]: Finished modprobe@drm.service. May 17 00:39:44.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.730628 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:44.730706 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:44.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.731060 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:44.731135 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.731521 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.731585 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.732279 systemd[1]: Finished ensure-sysext.service. May 17 00:39:44.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.752180 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:39:44.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:45.359564 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:39:45.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:45.360654 systemd[1]: Starting audit-rules.service... May 17 00:39:45.361593 systemd[1]: Starting clean-ca-certificates.service... May 17 00:39:45.362586 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:39:45.361000 audit: BPF prog-id=33 op=LOAD May 17 00:39:45.364764 systemd[1]: Starting systemd-resolved.service... May 17 00:39:45.363000 audit: BPF prog-id=34 op=LOAD May 17 00:39:45.365941 systemd[1]: Starting systemd-timesyncd.service... May 17 00:39:45.367126 systemd[1]: Starting systemd-update-utmp.service... May 17 00:39:45.373000 audit[1211]: SYSTEM_BOOT pid=1211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:39:45.376523 systemd[1]: Finished systemd-update-utmp.service. May 17 00:39:45.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:45.383215 systemd[1]: Finished clean-ca-certificates.service. May 17 00:39:45.383372 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:39:45.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:45.444288 systemd[1]: Started systemd-timesyncd.service. May 17 00:39:45.444445 systemd[1]: Reached target time-set.target. May 17 00:39:45.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:45.463839 systemd-resolved[1208]: Positive Trust Anchors: May 17 00:39:45.464045 systemd-resolved[1208]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:39:45.464110 systemd-resolved[1208]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:39:45.584965 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:39:45.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.063428 systemd-timesyncd[1209]: Contacted time server 45.83.234.123:123 (0.flatcar.pool.ntp.org). May 17 00:41:07.063487 systemd-timesyncd[1209]: Initial clock synchronization to Sat 2025-05-17 00:41:07.063313 UTC. May 17 00:41:07.097000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:41:07.097000 audit[1226]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd067603d0 a2=420 a3=0 items=0 ppid=1205 pid=1226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.097000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:41:07.098217 augenrules[1226]: No rules May 17 00:41:07.098567 systemd[1]: Finished audit-rules.service. May 17 00:41:07.104048 systemd-resolved[1208]: Defaulting to hostname 'linux'. May 17 00:41:07.105706 systemd[1]: Started systemd-resolved.service. May 17 00:41:07.105873 systemd[1]: Reached target network.target. May 17 00:41:07.105972 systemd[1]: Reached target network-online.target. May 17 00:41:07.106067 systemd[1]: Reached target nss-lookup.target. May 17 00:41:07.216873 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:41:07.232837 systemd[1]: Finished ldconfig.service. May 17 00:41:07.234049 systemd[1]: Starting systemd-update-done.service... May 17 00:41:07.242604 systemd[1]: Finished systemd-update-done.service. May 17 00:41:07.242780 systemd[1]: Reached target sysinit.target. May 17 00:41:07.242959 systemd[1]: Started motdgen.path. May 17 00:41:07.243059 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:41:07.243252 systemd[1]: Started logrotate.timer. May 17 00:41:07.243382 systemd[1]: Started mdadm.timer. May 17 00:41:07.243475 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:41:07.243570 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:41:07.243592 systemd[1]: Reached target paths.target. May 17 00:41:07.243673 systemd[1]: Reached target timers.target. May 17 00:41:07.243935 systemd[1]: Listening on dbus.socket. May 17 00:41:07.244923 systemd[1]: Starting docker.socket... May 17 00:41:07.256460 systemd[1]: Listening on sshd.socket. May 17 00:41:07.256634 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:07.256906 systemd[1]: Listening on docker.socket. May 17 00:41:07.257043 systemd[1]: Reached target sockets.target. May 17 00:41:07.257148 systemd[1]: Reached target basic.target. May 17 00:41:07.257262 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:41:07.257276 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:41:07.258120 systemd[1]: Starting containerd.service... May 17 00:41:07.259001 systemd[1]: Starting dbus.service... May 17 00:41:07.260776 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:41:07.262022 systemd[1]: Starting extend-filesystems.service... May 17 00:41:07.262769 jq[1236]: false May 17 00:41:07.263024 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:41:07.271162 systemd[1]: Starting kubelet.service... May 17 00:41:07.272277 systemd[1]: Starting motdgen.service... May 17 00:41:07.275842 systemd[1]: Starting prepare-helm.service... May 17 00:41:07.276936 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:41:07.277978 systemd[1]: Starting sshd-keygen.service... May 17 00:41:07.279874 systemd[1]: Starting systemd-logind.service... May 17 00:41:07.280016 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:07.280055 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:41:07.280646 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:41:07.281349 systemd[1]: Starting update-engine.service... May 17 00:41:07.282928 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:41:07.284959 systemd[1]: Starting vmtoolsd.service... May 17 00:41:07.290459 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:41:07.290586 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:41:07.294999 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:41:07.295106 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:41:07.296763 jq[1248]: true May 17 00:41:07.304767 jq[1260]: true May 17 00:41:07.307483 systemd[1]: Started vmtoolsd.service. May 17 00:41:07.309792 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:41:07.309906 systemd[1]: Finished motdgen.service. May 17 00:41:07.326771 extend-filesystems[1237]: Found loop1 May 17 00:41:07.327506 extend-filesystems[1237]: Found sda May 17 00:41:07.327506 extend-filesystems[1237]: Found sda1 May 17 00:41:07.327506 extend-filesystems[1237]: Found sda2 May 17 00:41:07.327506 extend-filesystems[1237]: Found sda3 May 17 00:41:07.327506 extend-filesystems[1237]: Found usr May 17 00:41:07.327506 extend-filesystems[1237]: Found sda4 May 17 00:41:07.327506 extend-filesystems[1237]: Found sda6 May 17 00:41:07.327506 extend-filesystems[1237]: Found sda7 May 17 00:41:07.327506 extend-filesystems[1237]: Found sda9 May 17 00:41:07.327506 extend-filesystems[1237]: Checking size of /dev/sda9 May 17 00:41:07.339268 env[1255]: time="2025-05-17T00:41:07.338937009Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:41:07.348375 tar[1254]: linux-amd64/LICENSE May 17 00:41:07.348375 tar[1254]: linux-amd64/helm May 17 00:41:07.377433 kernel: NET: Registered PF_VSOCK protocol family May 17 00:41:07.381811 extend-filesystems[1237]: Old size kept for /dev/sda9 May 17 00:41:07.383781 dbus-daemon[1235]: [system] SELinux support is enabled May 17 00:41:07.384041 systemd[1]: Started dbus.service. May 17 00:41:07.385432 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:41:07.385450 systemd[1]: Reached target system-config.target. May 17 00:41:07.385574 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:41:07.385585 systemd[1]: Reached target user-config.target. May 17 00:41:07.386229 bash[1285]: Updated "/home/core/.ssh/authorized_keys" May 17 00:41:07.386696 extend-filesystems[1237]: Found sr0 May 17 00:41:07.387016 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:41:07.388019 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:41:07.388121 systemd[1]: Finished extend-filesystems.service. May 17 00:41:07.396980 systemd-logind[1246]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:41:07.397995 systemd-logind[1246]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:41:07.398181 systemd-logind[1246]: New seat seat0. May 17 00:41:07.402604 systemd[1]: Started systemd-logind.service. May 17 00:41:07.403195 update_engine[1247]: I0517 00:41:07.401876 1247 main.cc:92] Flatcar Update Engine starting May 17 00:41:07.404903 systemd[1]: Started update-engine.service. May 17 00:41:07.406419 systemd[1]: Started locksmithd.service. May 17 00:41:07.407593 update_engine[1247]: I0517 00:41:07.407572 1247 update_check_scheduler.cc:74] Next update check in 4m6s May 17 00:41:07.420128 env[1255]: time="2025-05-17T00:41:07.420102350Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:41:07.420348 env[1255]: time="2025-05-17T00:41:07.420335603Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:07.425166 env[1255]: time="2025-05-17T00:41:07.425137873Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:07.425253 env[1255]: time="2025-05-17T00:41:07.425240798Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:07.425509 env[1255]: time="2025-05-17T00:41:07.425495153Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:07.425559 env[1255]: time="2025-05-17T00:41:07.425548851Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:41:07.425611 env[1255]: time="2025-05-17T00:41:07.425600447Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:41:07.425677 env[1255]: time="2025-05-17T00:41:07.425667130Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:41:07.425771 env[1255]: time="2025-05-17T00:41:07.425761276Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:07.425942 env[1255]: time="2025-05-17T00:41:07.425932200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:07.426061 env[1255]: time="2025-05-17T00:41:07.426049066Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:07.426105 env[1255]: time="2025-05-17T00:41:07.426095427Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:41:07.426171 env[1255]: time="2025-05-17T00:41:07.426161812Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:41:07.426219 env[1255]: time="2025-05-17T00:41:07.426210214Z" level=info msg="metadata content store policy set" policy=shared May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447413737Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447443420Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447455066Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447478920Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447487918Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447495758Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447502822Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447510239Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447517275Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447524957Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447532559Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447539545Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447620919Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:41:07.448614 env[1255]: time="2025-05-17T00:41:07.447671198Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447807774Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447824081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447832073Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447861988Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447869674Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447876499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447882456Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447888955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447895454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447901750Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447907705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447916030Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447977334Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447986641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:41:07.448867 env[1255]: time="2025-05-17T00:41:07.447994319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:41:07.449080 env[1255]: time="2025-05-17T00:41:07.448000847Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:41:07.449080 env[1255]: time="2025-05-17T00:41:07.448009429Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:41:07.449080 env[1255]: time="2025-05-17T00:41:07.448016351Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:41:07.449080 env[1255]: time="2025-05-17T00:41:07.448028840Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:41:07.449080 env[1255]: time="2025-05-17T00:41:07.448050972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:41:07.449158 env[1255]: time="2025-05-17T00:41:07.448165772Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:41:07.449158 env[1255]: time="2025-05-17T00:41:07.448197413Z" level=info msg="Connect containerd service" May 17 00:41:07.449158 env[1255]: time="2025-05-17T00:41:07.448213948Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:41:07.449158 env[1255]: time="2025-05-17T00:41:07.448522403Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:41:07.455083 env[1255]: time="2025-05-17T00:41:07.449281087Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:41:07.455083 env[1255]: time="2025-05-17T00:41:07.449304722Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:41:07.455083 env[1255]: time="2025-05-17T00:41:07.449330512Z" level=info msg="containerd successfully booted in 0.111882s" May 17 00:41:07.455083 env[1255]: time="2025-05-17T00:41:07.450843932Z" level=info msg="Start subscribing containerd event" May 17 00:41:07.449385 systemd[1]: Started containerd.service. May 17 00:41:07.490636 env[1255]: time="2025-05-17T00:41:07.490220549Z" level=info msg="Start recovering state" May 17 00:41:07.490636 env[1255]: time="2025-05-17T00:41:07.490308473Z" level=info msg="Start event monitor" May 17 00:41:07.490636 env[1255]: time="2025-05-17T00:41:07.490328105Z" level=info msg="Start snapshots syncer" May 17 00:41:07.490636 env[1255]: time="2025-05-17T00:41:07.490342119Z" level=info msg="Start cni network conf syncer for default" May 17 00:41:07.490636 env[1255]: time="2025-05-17T00:41:07.490350911Z" level=info msg="Start streaming server" May 17 00:41:07.898683 tar[1254]: linux-amd64/README.md May 17 00:41:07.902972 systemd[1]: Finished prepare-helm.service. May 17 00:41:08.100792 sshd_keygen[1258]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:41:08.117620 systemd[1]: Finished sshd-keygen.service. May 17 00:41:08.118823 systemd[1]: Starting issuegen.service... May 17 00:41:08.122915 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:41:08.123009 systemd[1]: Finished issuegen.service. May 17 00:41:08.124174 systemd[1]: Starting systemd-user-sessions.service... May 17 00:41:08.135116 systemd[1]: Finished systemd-user-sessions.service. May 17 00:41:08.136141 systemd[1]: Started getty@tty1.service. May 17 00:41:08.137068 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:41:08.137274 systemd[1]: Reached target getty.target. May 17 00:41:08.157499 locksmithd[1296]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:41:09.523119 systemd[1]: Started kubelet.service. May 17 00:41:09.523724 systemd[1]: Reached target multi-user.target. May 17 00:41:09.525626 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:41:09.531749 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:41:09.532102 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:41:09.532327 systemd[1]: Startup finished in 922ms (kernel) + 5.125s (initrd) + 8.442s (userspace) = 14.489s. May 17 00:41:09.562647 login[1378]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:41:09.563620 login[1379]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:41:09.572511 systemd[1]: Created slice user-500.slice. May 17 00:41:09.573327 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:41:09.577423 systemd-logind[1246]: New session 2 of user core. May 17 00:41:09.579791 systemd-logind[1246]: New session 1 of user core. May 17 00:41:09.582278 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:41:09.583408 systemd[1]: Starting user@500.service... May 17 00:41:09.596268 (systemd)[1385]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:09.663653 systemd[1385]: Queued start job for default target default.target. May 17 00:41:09.664021 systemd[1385]: Reached target paths.target. May 17 00:41:09.664033 systemd[1385]: Reached target sockets.target. May 17 00:41:09.664042 systemd[1385]: Reached target timers.target. May 17 00:41:09.664049 systemd[1385]: Reached target basic.target. May 17 00:41:09.664118 systemd[1]: Started user@500.service. May 17 00:41:09.664883 systemd[1]: Started session-1.scope. May 17 00:41:09.665411 systemd[1]: Started session-2.scope. May 17 00:41:09.665449 systemd[1385]: Reached target default.target. May 17 00:41:09.665475 systemd[1385]: Startup finished in 65ms. May 17 00:41:10.411242 kubelet[1382]: E0517 00:41:10.411214 1382 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:10.412753 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:10.412830 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:20.663464 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:41:20.663623 systemd[1]: Stopped kubelet.service. May 17 00:41:20.664835 systemd[1]: Starting kubelet.service... May 17 00:41:20.727132 systemd[1]: Started kubelet.service. May 17 00:41:20.832396 kubelet[1414]: E0517 00:41:20.832362 1414 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:20.834646 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:20.834718 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:31.085306 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:41:31.085483 systemd[1]: Stopped kubelet.service. May 17 00:41:31.086694 systemd[1]: Starting kubelet.service... May 17 00:41:31.146529 systemd[1]: Started kubelet.service. May 17 00:41:31.206937 kubelet[1423]: E0517 00:41:31.206914 1423 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:31.208118 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:31.208190 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:37.446318 systemd[1]: Created slice system-sshd.slice. May 17 00:41:37.447359 systemd[1]: Started sshd@0-139.178.70.109:22-147.75.109.163:55450.service. May 17 00:41:37.498890 sshd[1429]: Accepted publickey for core from 147.75.109.163 port 55450 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:37.500020 sshd[1429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:37.503139 systemd-logind[1246]: New session 3 of user core. May 17 00:41:37.503686 systemd[1]: Started session-3.scope. May 17 00:41:37.552961 systemd[1]: Started sshd@1-139.178.70.109:22-147.75.109.163:55452.service. May 17 00:41:37.592411 sshd[1434]: Accepted publickey for core from 147.75.109.163 port 55452 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:37.593291 sshd[1434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:37.595873 systemd-logind[1246]: New session 4 of user core. May 17 00:41:37.596355 systemd[1]: Started session-4.scope. May 17 00:41:37.649866 systemd[1]: Started sshd@2-139.178.70.109:22-147.75.109.163:55464.service. May 17 00:41:37.650188 sshd[1434]: pam_unix(sshd:session): session closed for user core May 17 00:41:37.653721 systemd[1]: sshd@1-139.178.70.109:22-147.75.109.163:55452.service: Deactivated successfully. May 17 00:41:37.654214 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:41:37.654704 systemd-logind[1246]: Session 4 logged out. Waiting for processes to exit. May 17 00:41:37.655461 systemd-logind[1246]: Removed session 4. May 17 00:41:37.691440 sshd[1439]: Accepted publickey for core from 147.75.109.163 port 55464 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:37.692300 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:37.694794 systemd-logind[1246]: New session 5 of user core. May 17 00:41:37.695264 systemd[1]: Started session-5.scope. May 17 00:41:37.743651 sshd[1439]: pam_unix(sshd:session): session closed for user core May 17 00:41:37.745994 systemd[1]: Started sshd@3-139.178.70.109:22-147.75.109.163:55480.service. May 17 00:41:37.746392 systemd[1]: sshd@2-139.178.70.109:22-147.75.109.163:55464.service: Deactivated successfully. May 17 00:41:37.746886 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:41:37.747348 systemd-logind[1246]: Session 5 logged out. Waiting for processes to exit. May 17 00:41:37.748307 systemd-logind[1246]: Removed session 5. May 17 00:41:37.789940 sshd[1445]: Accepted publickey for core from 147.75.109.163 port 55480 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:37.791020 sshd[1445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:37.794036 systemd-logind[1246]: New session 6 of user core. May 17 00:41:37.794717 systemd[1]: Started session-6.scope. May 17 00:41:37.846257 sshd[1445]: pam_unix(sshd:session): session closed for user core May 17 00:41:37.848437 systemd[1]: sshd@3-139.178.70.109:22-147.75.109.163:55480.service: Deactivated successfully. May 17 00:41:37.848842 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:41:37.849369 systemd-logind[1246]: Session 6 logged out. Waiting for processes to exit. May 17 00:41:37.850104 systemd[1]: Started sshd@4-139.178.70.109:22-147.75.109.163:55492.service. May 17 00:41:37.850833 systemd-logind[1246]: Removed session 6. May 17 00:41:37.892404 sshd[1452]: Accepted publickey for core from 147.75.109.163 port 55492 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:37.893337 sshd[1452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:37.896417 systemd-logind[1246]: New session 7 of user core. May 17 00:41:37.897165 systemd[1]: Started session-7.scope. May 17 00:41:37.958964 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:41:37.959140 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:37.967659 dbus-daemon[1235]: \xd0-\xf3\xf0$V: received setenforce notice (enforcing=-1505266016) May 17 00:41:37.967774 sudo[1455]: pam_unix(sudo:session): session closed for user root May 17 00:41:37.970296 sshd[1452]: pam_unix(sshd:session): session closed for user core May 17 00:41:37.972662 systemd[1]: Started sshd@5-139.178.70.109:22-147.75.109.163:55500.service. May 17 00:41:37.973483 systemd[1]: sshd@4-139.178.70.109:22-147.75.109.163:55492.service: Deactivated successfully. May 17 00:41:37.973999 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:41:37.974692 systemd-logind[1246]: Session 7 logged out. Waiting for processes to exit. May 17 00:41:37.976539 systemd-logind[1246]: Removed session 7. May 17 00:41:38.015730 sshd[1458]: Accepted publickey for core from 147.75.109.163 port 55500 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:38.016292 sshd[1458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:38.019132 systemd[1]: Started session-8.scope. May 17 00:41:38.019913 systemd-logind[1246]: New session 8 of user core. May 17 00:41:38.069518 sudo[1463]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:41:38.069921 sudo[1463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:38.072104 sudo[1463]: pam_unix(sudo:session): session closed for user root May 17 00:41:38.075584 sudo[1462]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:41:38.075758 sudo[1462]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:38.082602 systemd[1]: Stopping audit-rules.service... May 17 00:41:38.085406 kernel: kauditd_printk_skb: 49 callbacks suppressed May 17 00:41:38.085460 kernel: audit: type=1305 audit(1747442498.083:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:41:38.083000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:41:38.083000 audit[1466]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd562fbcc0 a2=420 a3=0 items=0 ppid=1 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.090934 kernel: audit: type=1300 audit(1747442498.083:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd562fbcc0 a2=420 a3=0 items=0 ppid=1 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.090972 kernel: audit: type=1327 audit(1747442498.083:209): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:41:38.083000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:41:38.092175 auditctl[1466]: No rules May 17 00:41:38.095482 kernel: audit: type=1131 audit(1747442498.092:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.092448 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:41:38.092547 systemd[1]: Stopped audit-rules.service. May 17 00:41:38.095936 systemd[1]: Starting audit-rules.service... May 17 00:41:38.106815 augenrules[1483]: No rules May 17 00:41:38.112393 kernel: audit: type=1130 audit(1747442498.107:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.112433 kernel: audit: type=1106 audit(1747442498.107:212): pid=1462 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.107000 audit[1462]: USER_END pid=1462 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.107814 sudo[1462]: pam_unix(sudo:session): session closed for user root May 17 00:41:38.107275 systemd[1]: Finished audit-rules.service. May 17 00:41:38.111440 sshd[1458]: pam_unix(sshd:session): session closed for user core May 17 00:41:38.115935 systemd[1]: Started sshd@6-139.178.70.109:22-147.75.109.163:54428.service. May 17 00:41:38.116211 systemd[1]: sshd@5-139.178.70.109:22-147.75.109.163:55500.service: Deactivated successfully. May 17 00:41:38.116594 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:41:38.107000 audit[1462]: CRED_DISP pid=1462 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.119407 kernel: audit: type=1104 audit(1747442498.107:213): pid=1462 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.119447 kernel: audit: type=1106 audit(1747442498.114:214): pid=1458 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.114000 audit[1458]: USER_END pid=1458 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.119556 systemd-logind[1246]: Session 8 logged out. Waiting for processes to exit. May 17 00:41:38.114000 audit[1458]: CRED_DISP pid=1458 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.125992 kernel: audit: type=1104 audit(1747442498.114:215): pid=1458 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-147.75.109.163:54428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.126216 systemd-logind[1246]: Removed session 8. May 17 00:41:38.128865 kernel: audit: type=1130 audit(1747442498.115:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-147.75.109.163:54428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.109:22-147.75.109.163:55500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.160591 sshd[1488]: Accepted publickey for core from 147.75.109.163 port 54428 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:41:38.160000 audit[1488]: USER_ACCT pid=1488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.160000 audit[1488]: CRED_ACQ pid=1488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.160000 audit[1488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3ba9110 a2=3 a3=0 items=0 ppid=1 pid=1488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:38.161393 sshd[1488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:38.163892 systemd-logind[1246]: New session 9 of user core. May 17 00:41:38.164347 systemd[1]: Started session-9.scope. May 17 00:41:38.166000 audit[1488]: USER_START pid=1488 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.167000 audit[1491]: CRED_ACQ pid=1491 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:41:38.214000 audit[1492]: USER_ACCT pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.214802 sudo[1492]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:41:38.214000 audit[1492]: CRED_REFR pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.215233 sudo[1492]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:38.216000 audit[1492]: USER_START pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:38.230119 systemd[1]: Starting docker.service... May 17 00:41:38.251215 env[1502]: time="2025-05-17T00:41:38.251188139Z" level=info msg="Starting up" May 17 00:41:38.252551 env[1502]: time="2025-05-17T00:41:38.252534168Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:41:38.252551 env[1502]: time="2025-05-17T00:41:38.252548789Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:41:38.252608 env[1502]: time="2025-05-17T00:41:38.252562783Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:41:38.252608 env[1502]: time="2025-05-17T00:41:38.252570033Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:41:38.253734 env[1502]: time="2025-05-17T00:41:38.253718355Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:41:38.253734 env[1502]: time="2025-05-17T00:41:38.253729739Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:41:38.253792 env[1502]: time="2025-05-17T00:41:38.253737186Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:41:38.253792 env[1502]: time="2025-05-17T00:41:38.253741953Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:41:38.256437 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport271230342-merged.mount: Deactivated successfully. May 17 00:41:38.269133 env[1502]: time="2025-05-17T00:41:38.269100770Z" level=info msg="Loading containers: start." May 17 00:41:38.309000 audit[1532]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.309000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff9fd05780 a2=0 a3=7fff9fd0576c items=0 ppid=1502 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.309000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:41:38.310000 audit[1534]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1534 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.310000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc7f04bd20 a2=0 a3=7ffc7f04bd0c items=0 ppid=1502 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.310000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:41:38.311000 audit[1536]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.311000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc4bcf2700 a2=0 a3=7ffc4bcf26ec items=0 ppid=1502 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:41:38.312000 audit[1538]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.312000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe89fece00 a2=0 a3=7ffe89fecdec items=0 ppid=1502 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:41:38.314000 audit[1540]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.314000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd55f26be0 a2=0 a3=7ffd55f26bcc items=0 ppid=1502 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:41:38.326000 audit[1545]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.326000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff80680ed0 a2=0 a3=7fff80680ebc items=0 ppid=1502 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:41:38.329000 audit[1547]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.329000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff73c36060 a2=0 a3=7fff73c3604c items=0 ppid=1502 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:41:38.330000 audit[1549]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.330000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffefa1bd5c0 a2=0 a3=7ffefa1bd5ac items=0 ppid=1502 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:41:38.331000 audit[1551]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.331000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff7aff60f0 a2=0 a3=7fff7aff60dc items=0 ppid=1502 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:38.334000 audit[1555]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.334000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd8aa81c20 a2=0 a3=7ffd8aa81c0c items=0 ppid=1502 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:38.338000 audit[1556]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.338000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc245de680 a2=0 a3=7ffc245de66c items=0 ppid=1502 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:38.345393 kernel: Initializing XFRM netlink socket May 17 00:41:38.367619 env[1502]: time="2025-05-17T00:41:38.367601384Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:41:38.380000 audit[1564]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.380000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdd54256e0 a2=0 a3=7ffdd54256cc items=0 ppid=1502 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.380000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:41:38.389000 audit[1567]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.389000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcde7c78c0 a2=0 a3=7ffcde7c78ac items=0 ppid=1502 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.389000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:41:38.390000 audit[1570]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.390000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff8526e000 a2=0 a3=7fff8526dfec items=0 ppid=1502 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.390000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:41:38.392000 audit[1572]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.392000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe813e3f40 a2=0 a3=7ffe813e3f2c items=0 ppid=1502 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.392000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:41:38.393000 audit[1574]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.393000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd587b8420 a2=0 a3=7ffd587b840c items=0 ppid=1502 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.393000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:41:38.394000 audit[1576]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.394000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff4e71f230 a2=0 a3=7fff4e71f21c items=0 ppid=1502 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:41:38.396000 audit[1578]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.396000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffecaebe500 a2=0 a3=7ffecaebe4ec items=0 ppid=1502 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:41:38.401000 audit[1581]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.401000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe6bc545e0 a2=0 a3=7ffe6bc545cc items=0 ppid=1502 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:41:38.402000 audit[1583]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.402000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffec8675bc0 a2=0 a3=7ffec8675bac items=0 ppid=1502 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.402000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:41:38.404000 audit[1585]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.404000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff96d8f410 a2=0 a3=7fff96d8f3fc items=0 ppid=1502 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.404000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:41:38.405000 audit[1587]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.405000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1fe5f950 a2=0 a3=7ffe1fe5f93c items=0 ppid=1502 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.405000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:41:38.406002 systemd-networkd[1066]: docker0: Link UP May 17 00:41:38.408000 audit[1591]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.408000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe37cb43a0 a2=0 a3=7ffe37cb438c items=0 ppid=1502 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.408000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:38.413000 audit[1592]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:38.413000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe79778290 a2=0 a3=7ffe7977827c items=0 ppid=1502 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.413000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:41:38.414350 env[1502]: time="2025-05-17T00:41:38.414332786Z" level=info msg="Loading containers: done." May 17 00:41:38.419754 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4149795645-merged.mount: Deactivated successfully. May 17 00:41:38.425085 env[1502]: time="2025-05-17T00:41:38.425069013Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:41:38.425245 env[1502]: time="2025-05-17T00:41:38.425234873Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:41:38.425335 env[1502]: time="2025-05-17T00:41:38.425326940Z" level=info msg="Daemon has completed initialization" May 17 00:41:38.435309 env[1502]: time="2025-05-17T00:41:38.435281489Z" level=info msg="API listen on /run/docker.sock" May 17 00:41:38.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.435479 systemd[1]: Started docker.service. May 17 00:41:39.014360 env[1255]: time="2025-05-17T00:41:39.014192384Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 17 00:41:39.532226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2619937125.mount: Deactivated successfully. May 17 00:41:40.703947 env[1255]: time="2025-05-17T00:41:40.703919695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.704715 env[1255]: time="2025-05-17T00:41:40.704701789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.705673 env[1255]: time="2025-05-17T00:41:40.705661733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.706621 env[1255]: time="2025-05-17T00:41:40.706603888Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.707109 env[1255]: time="2025-05-17T00:41:40.707090822Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66\"" May 17 00:41:40.707415 env[1255]: time="2025-05-17T00:41:40.707399543Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 17 00:41:41.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:41.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:41.352287 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:41:41.352461 systemd[1]: Stopped kubelet.service. May 17 00:41:41.354520 systemd[1]: Starting kubelet.service... May 17 00:41:41.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:41.415683 systemd[1]: Started kubelet.service. May 17 00:41:41.437471 kubelet[1628]: E0517 00:41:41.437438 1628 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:41.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:41.438607 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:41.438685 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:42.434152 env[1255]: time="2025-05-17T00:41:42.434122091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:42.446553 env[1255]: time="2025-05-17T00:41:42.446532419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:42.460047 env[1255]: time="2025-05-17T00:41:42.460022245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:42.464910 env[1255]: time="2025-05-17T00:41:42.464879210Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:42.465581 env[1255]: time="2025-05-17T00:41:42.465555021Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4\"" May 17 00:41:42.465944 env[1255]: time="2025-05-17T00:41:42.465904699Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 17 00:41:43.706655 env[1255]: time="2025-05-17T00:41:43.706618768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:43.761714 env[1255]: time="2025-05-17T00:41:43.761683098Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:43.784246 env[1255]: time="2025-05-17T00:41:43.784209531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:43.794599 env[1255]: time="2025-05-17T00:41:43.794576360Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:43.795099 env[1255]: time="2025-05-17T00:41:43.795080544Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49\"" May 17 00:41:43.795854 env[1255]: time="2025-05-17T00:41:43.795829851Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:41:44.664160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2212124785.mount: Deactivated successfully. May 17 00:41:45.139635 env[1255]: time="2025-05-17T00:41:45.139602391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.143518 env[1255]: time="2025-05-17T00:41:45.143497059Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.145175 env[1255]: time="2025-05-17T00:41:45.145151827Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:41:45.145631 env[1255]: time="2025-05-17T00:41:45.145618933Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 17 00:41:45.145805 env[1255]: time="2025-05-17T00:41:45.145655465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.146046 env[1255]: time="2025-05-17T00:41:45.146028620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:45.621914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3649208099.mount: Deactivated successfully. May 17 00:41:46.753592 env[1255]: time="2025-05-17T00:41:46.753536152Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:46.776670 env[1255]: time="2025-05-17T00:41:46.776631437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:46.786971 env[1255]: time="2025-05-17T00:41:46.786948257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:46.797292 env[1255]: time="2025-05-17T00:41:46.797259015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:46.797559 env[1255]: time="2025-05-17T00:41:46.797533182Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" May 17 00:41:46.798560 env[1255]: time="2025-05-17T00:41:46.798533964Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:41:47.341270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3679133084.mount: Deactivated successfully. May 17 00:41:47.344047 env[1255]: time="2025-05-17T00:41:47.344019787Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.345189 env[1255]: time="2025-05-17T00:41:47.345169217Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.346243 env[1255]: time="2025-05-17T00:41:47.346224660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.347259 env[1255]: time="2025-05-17T00:41:47.347239131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:47.347430 env[1255]: time="2025-05-17T00:41:47.347409427Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:41:47.348088 env[1255]: time="2025-05-17T00:41:47.348069948Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 17 00:41:50.192098 env[1255]: time="2025-05-17T00:41:50.192052753Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:50.207901 env[1255]: time="2025-05-17T00:41:50.207868665Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:50.217876 env[1255]: time="2025-05-17T00:41:50.217854511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:50.230476 env[1255]: time="2025-05-17T00:41:50.230457891Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:50.231150 env[1255]: time="2025-05-17T00:41:50.231131496Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" May 17 00:41:51.602243 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:41:51.602369 systemd[1]: Stopped kubelet.service. May 17 00:41:51.603445 systemd[1]: Starting kubelet.service... May 17 00:41:51.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:51.611617 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:41:51.611658 kernel: audit: type=1130 audit(1747442511.602:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:51.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:51.618388 kernel: audit: type=1131 audit(1747442511.602:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:52.923750 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:41:52.923796 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:41:52.923922 systemd[1]: Stopped kubelet.service. May 17 00:41:52.937848 kernel: audit: type=1130 audit(1747442512.923:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:52.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:52.925349 systemd[1]: Starting kubelet.service... May 17 00:41:52.951681 systemd[1]: Reloading. May 17 00:41:53.004910 /usr/lib/systemd/system-generators/torcx-generator[1683]: time="2025-05-17T00:41:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:41:53.004929 /usr/lib/systemd/system-generators/torcx-generator[1683]: time="2025-05-17T00:41:53Z" level=info msg="torcx already run" May 17 00:41:53.057620 update_engine[1247]: I0517 00:41:53.057412 1247 update_attempter.cc:509] Updating boot flags... May 17 00:41:53.065416 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:41:53.065518 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:41:53.079294 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:41:53.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.127782 kernel: audit: type=1400 audit(1747442513.122:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.127819 kernel: audit: type=1400 audit(1747442513.122:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.127835 kernel: audit: type=1400 audit(1747442513.122:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.136718 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:41:53.136752 kernel: audit: type=1400 audit(1747442513.122:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.136768 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:41:53.136781 kernel: audit: type=1400 audit(1747442513.122:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.129000 audit: BPF prog-id=40 op=LOAD May 17 00:41:53.129000 audit: BPF prog-id=38 op=UNLOAD May 17 00:41:53.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.130000 audit: BPF prog-id=41 op=LOAD May 17 00:41:53.130000 audit: BPF prog-id=24 op=UNLOAD May 17 00:41:53.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.131000 audit: BPF prog-id=42 op=LOAD May 17 00:41:53.131000 audit: BPF prog-id=33 op=UNLOAD May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit: BPF prog-id=43 op=LOAD May 17 00:41:53.132000 audit: BPF prog-id=25 op=UNLOAD May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit: BPF prog-id=44 op=LOAD May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.132000 audit: BPF prog-id=45 op=LOAD May 17 00:41:53.132000 audit: BPF prog-id=26 op=UNLOAD May 17 00:41:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit: BPF prog-id=52 op=LOAD May 17 00:41:53.143000 audit: BPF prog-id=35 op=UNLOAD May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit: BPF prog-id=53 op=LOAD May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:53.143000 audit: BPF prog-id=54 op=LOAD May 17 00:41:53.143000 audit: BPF prog-id=36 op=UNLOAD May 17 00:41:53.143000 audit: BPF prog-id=37 op=UNLOAD May 17 00:41:53.169240 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:41:53.169372 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:41:53.169578 systemd[1]: Stopped kubelet.service. May 17 00:41:53.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:53.170940 systemd[1]: Starting kubelet.service... May 17 00:41:54.060138 systemd[1]: Started kubelet.service. May 17 00:41:54.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:54.158207 kubelet[1765]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:41:54.158207 kubelet[1765]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:41:54.158207 kubelet[1765]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:41:54.158505 kubelet[1765]: I0517 00:41:54.158280 1765 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:41:54.533192 kubelet[1765]: I0517 00:41:54.533165 1765 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:41:54.533192 kubelet[1765]: I0517 00:41:54.533187 1765 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:41:54.533342 kubelet[1765]: I0517 00:41:54.533329 1765 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:41:54.705321 kubelet[1765]: I0517 00:41:54.705300 1765 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:41:54.707478 kubelet[1765]: E0517 00:41:54.707453 1765 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://139.178.70.109:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:41:54.719066 kubelet[1765]: E0517 00:41:54.719035 1765 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:41:54.719190 kubelet[1765]: I0517 00:41:54.719178 1765 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:41:54.726188 kubelet[1765]: I0517 00:41:54.726178 1765 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:41:54.726406 kubelet[1765]: I0517 00:41:54.726375 1765 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:41:54.726588 kubelet[1765]: I0517 00:41:54.726457 1765 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:41:54.726710 kubelet[1765]: I0517 00:41:54.726698 1765 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:41:54.726757 kubelet[1765]: I0517 00:41:54.726750 1765 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:41:54.734202 kubelet[1765]: I0517 00:41:54.734191 1765 state_mem.go:36] "Initialized new in-memory state store" May 17 00:41:54.819565 kubelet[1765]: I0517 00:41:54.819488 1765 kubelet.go:480] "Attempting to sync node with API server" May 17 00:41:54.819701 kubelet[1765]: I0517 00:41:54.819688 1765 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:41:54.819786 kubelet[1765]: I0517 00:41:54.819776 1765 kubelet.go:386] "Adding apiserver pod source" May 17 00:41:54.819982 kubelet[1765]: I0517 00:41:54.819959 1765 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:41:54.947283 kubelet[1765]: I0517 00:41:54.947268 1765 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:41:54.947698 kubelet[1765]: I0517 00:41:54.947689 1765 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:41:54.956273 kubelet[1765]: W0517 00:41:54.956249 1765 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:41:54.960244 kubelet[1765]: E0517 00:41:54.960219 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://139.178.70.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:41:54.960313 kubelet[1765]: E0517 00:41:54.960289 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://139.178.70.109:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:41:54.970570 kubelet[1765]: I0517 00:41:54.970552 1765 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:41:54.970685 kubelet[1765]: I0517 00:41:54.970676 1765 server.go:1289] "Started kubelet" May 17 00:41:55.008000 audit[1765]: AVC avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:55.008000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:55.008000 audit[1765]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00074be60 a1=c000741fc8 a2=c00074be30 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:55.009678 kubelet[1765]: I0517 00:41:55.009654 1765 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:41:55.009000 audit[1765]: AVC avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:55.009000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:55.009000 audit[1765]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008a0780 a1=c000741fe0 a2=c00074bef0 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:55.009890 kubelet[1765]: I0517 00:41:55.009872 1765 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:41:55.017727 kubelet[1765]: I0517 00:41:55.017701 1765 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:41:55.020270 kubelet[1765]: E0517 00:41:55.019264 1765 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.109:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.109:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.184029b5823da8a1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-17 00:41:54.970650785 +0000 UTC m=+0.905240418,LastTimestamp:2025-05-17 00:41:54.970650785 +0000 UTC m=+0.905240418,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 17 00:41:55.022000 audit[1778]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.022000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdca45dd80 a2=0 a3=7ffdca45dd6c items=0 ppid=1765 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:41:55.023511 kubelet[1765]: I0517 00:41:55.023474 1765 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:41:55.023000 audit[1779]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.023000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff82897f90 a2=0 a3=7fff82897f7c items=0 ppid=1765 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:41:55.024506 kubelet[1765]: I0517 00:41:55.024316 1765 server.go:317] "Adding debug handlers to kubelet server" May 17 00:41:55.024659 kubelet[1765]: I0517 00:41:55.024650 1765 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:41:55.024842 kubelet[1765]: E0517 00:41:55.024831 1765 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:41:55.025000 audit[1782]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.025000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1e7df6e0 a2=0 a3=7ffc1e7df6cc items=0 ppid=1765 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:55.026064 kubelet[1765]: I0517 00:41:55.026035 1765 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:41:55.026178 kubelet[1765]: I0517 00:41:55.026166 1765 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:41:55.026308 kubelet[1765]: I0517 00:41:55.026295 1765 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:41:55.026667 kubelet[1765]: E0517 00:41:55.026551 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="200ms" May 17 00:41:55.027163 kubelet[1765]: I0517 00:41:55.026749 1765 factory.go:223] Registration of the systemd container factory successfully May 17 00:41:55.027163 kubelet[1765]: I0517 00:41:55.026799 1765 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:41:55.027163 kubelet[1765]: I0517 00:41:55.027138 1765 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:41:55.027244 kubelet[1765]: I0517 00:41:55.027166 1765 reconciler.go:26] "Reconciler: start to sync state" May 17 00:41:55.027696 kubelet[1765]: E0517 00:41:55.027678 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://139.178.70.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:41:55.027000 audit[1785]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.027000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd6ad6430 a2=0 a3=7fffd6ad641c items=0 ppid=1765 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:55.028878 kubelet[1765]: I0517 00:41:55.028868 1765 factory.go:223] Registration of the containerd container factory successfully May 17 00:41:55.034000 audit[1788]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.034000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe7471a980 a2=0 a3=7ffe7471a96c items=0 ppid=1765 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:41:55.035635 kubelet[1765]: I0517 00:41:55.035609 1765 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:41:55.035000 audit[1789]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:55.035000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4e0c5b50 a2=0 a3=7ffc4e0c5b3c items=0 ppid=1765 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:41:55.036352 kubelet[1765]: I0517 00:41:55.036338 1765 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:41:55.036393 kubelet[1765]: I0517 00:41:55.036355 1765 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:41:55.036393 kubelet[1765]: I0517 00:41:55.036371 1765 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:41:55.036393 kubelet[1765]: I0517 00:41:55.036384 1765 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:41:55.036453 kubelet[1765]: E0517 00:41:55.036410 1765 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:41:55.036000 audit[1790]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.036000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb0b2a980 a2=0 a3=7ffeb0b2a96c items=0 ppid=1765 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:41:55.037000 audit[1791]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.037000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd87ce15d0 a2=0 a3=7ffd87ce15bc items=0 ppid=1765 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:41:55.038000 audit[1792]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:55.038000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7199a3b0 a2=0 a3=7ffe7199a39c items=0 ppid=1765 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:41:55.039000 audit[1793]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:55.039000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc765c1e40 a2=0 a3=7ffc765c1e2c items=0 ppid=1765 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:41:55.039000 audit[1794]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:55.039000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcdc0aa500 a2=0 a3=7ffcdc0aa4ec items=0 ppid=1765 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:41:55.040000 audit[1795]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:55.040000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdef79f4f0 a2=0 a3=7ffdef79f4dc items=0 ppid=1765 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:41:55.041453 kubelet[1765]: E0517 00:41:55.041435 1765 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:41:55.041787 kubelet[1765]: E0517 00:41:55.041772 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://139.178.70.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:41:55.048749 kubelet[1765]: I0517 00:41:55.048736 1765 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:41:55.048846 kubelet[1765]: I0517 00:41:55.048836 1765 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:41:55.048906 kubelet[1765]: I0517 00:41:55.048898 1765 state_mem.go:36] "Initialized new in-memory state store" May 17 00:41:55.058428 kubelet[1765]: I0517 00:41:55.058417 1765 policy_none.go:49] "None policy: Start" May 17 00:41:55.058501 kubelet[1765]: I0517 00:41:55.058492 1765 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:41:55.058549 kubelet[1765]: I0517 00:41:55.058542 1765 state_mem.go:35] "Initializing new in-memory state store" May 17 00:41:55.067913 systemd[1]: Created slice kubepods.slice. May 17 00:41:55.070867 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:41:55.074574 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:41:55.084959 kubelet[1765]: E0517 00:41:55.084945 1765 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:41:55.084000 audit[1765]: AVC avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:55.084000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:55.084000 audit[1765]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000938cf0 a1=c000a49e00 a2=c000938cc0 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:55.086036 kubelet[1765]: E0517 00:41:55.085772 1765 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:41:55.086036 kubelet[1765]: I0517 00:41:55.085859 1765 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:41:55.086036 kubelet[1765]: I0517 00:41:55.085867 1765 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:41:55.086119 kubelet[1765]: I0517 00:41:55.086049 1765 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:41:55.086912 kubelet[1765]: E0517 00:41:55.086892 1765 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:41:55.086957 kubelet[1765]: E0517 00:41:55.086917 1765 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 17 00:41:55.159482 systemd[1]: Created slice kubepods-burstable-pod97963c41ada533e2e0872a518ecd4611.slice. May 17 00:41:55.168011 kubelet[1765]: E0517 00:41:55.167977 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:55.186838 kubelet[1765]: I0517 00:41:55.186818 1765 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:41:55.187084 kubelet[1765]: E0517 00:41:55.187063 1765 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" May 17 00:41:55.191940 systemd[1]: Created slice kubepods-burstable-pod8fba52155e63f70cc922ab7cc8c200fd.slice. May 17 00:41:55.202121 kubelet[1765]: E0517 00:41:55.202106 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:55.214909 systemd[1]: Created slice kubepods-burstable-podfda54e39eada080929aa3294dbb84f99.slice. May 17 00:41:55.216409 kubelet[1765]: E0517 00:41:55.216387 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:55.227843 kubelet[1765]: E0517 00:41:55.227822 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="400ms" May 17 00:41:55.227912 kubelet[1765]: I0517 00:41:55.227894 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:41:55.227952 kubelet[1765]: I0517 00:41:55.227914 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:41:55.227952 kubelet[1765]: I0517 00:41:55.227929 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:41:55.227999 kubelet[1765]: I0517 00:41:55.227958 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fda54e39eada080929aa3294dbb84f99-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"fda54e39eada080929aa3294dbb84f99\") " pod="kube-system/kube-apiserver-localhost" May 17 00:41:55.227999 kubelet[1765]: I0517 00:41:55.227980 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fda54e39eada080929aa3294dbb84f99-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"fda54e39eada080929aa3294dbb84f99\") " pod="kube-system/kube-apiserver-localhost" May 17 00:41:55.227999 kubelet[1765]: I0517 00:41:55.227993 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:41:55.228078 kubelet[1765]: I0517 00:41:55.228006 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:41:55.228078 kubelet[1765]: I0517 00:41:55.228020 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8fba52155e63f70cc922ab7cc8c200fd-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8fba52155e63f70cc922ab7cc8c200fd\") " pod="kube-system/kube-scheduler-localhost" May 17 00:41:55.228078 kubelet[1765]: I0517 00:41:55.228048 1765 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fda54e39eada080929aa3294dbb84f99-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"fda54e39eada080929aa3294dbb84f99\") " pod="kube-system/kube-apiserver-localhost" May 17 00:41:55.388129 kubelet[1765]: I0517 00:41:55.388107 1765 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:41:55.388365 kubelet[1765]: E0517 00:41:55.388346 1765 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" May 17 00:41:55.477758 env[1255]: time="2025-05-17T00:41:55.477732798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:97963c41ada533e2e0872a518ecd4611,Namespace:kube-system,Attempt:0,}" May 17 00:41:55.503215 env[1255]: time="2025-05-17T00:41:55.503196434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8fba52155e63f70cc922ab7cc8c200fd,Namespace:kube-system,Attempt:0,}" May 17 00:41:55.517017 env[1255]: time="2025-05-17T00:41:55.516998582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:fda54e39eada080929aa3294dbb84f99,Namespace:kube-system,Attempt:0,}" May 17 00:41:55.628314 kubelet[1765]: E0517 00:41:55.628278 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="800ms" May 17 00:41:55.790283 kubelet[1765]: I0517 00:41:55.790216 1765 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:41:55.790745 kubelet[1765]: E0517 00:41:55.790717 1765 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" May 17 00:41:55.865710 kubelet[1765]: E0517 00:41:55.865681 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://139.178.70.109:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:41:56.080042 kubelet[1765]: E0517 00:41:56.079964 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://139.178.70.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:41:56.103223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4159924829.mount: Deactivated successfully. May 17 00:41:56.146630 env[1255]: time="2025-05-17T00:41:56.146594163Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.172060 env[1255]: time="2025-05-17T00:41:56.172023678Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.184761 env[1255]: time="2025-05-17T00:41:56.184731328Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.185858 env[1255]: time="2025-05-17T00:41:56.185838795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.187362 env[1255]: time="2025-05-17T00:41:56.187333760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.188117 env[1255]: time="2025-05-17T00:41:56.188095425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.189302 env[1255]: time="2025-05-17T00:41:56.189277595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.192016 env[1255]: time="2025-05-17T00:41:56.191994993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.193065 env[1255]: time="2025-05-17T00:41:56.193047466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.194877 env[1255]: time="2025-05-17T00:41:56.194859858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.198954 env[1255]: time="2025-05-17T00:41:56.198933926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.199697 env[1255]: time="2025-05-17T00:41:56.199674560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:56.200374 kubelet[1765]: E0517 00:41:56.200348 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://139.178.70.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:41:56.212447 env[1255]: time="2025-05-17T00:41:56.210576294Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:56.212447 env[1255]: time="2025-05-17T00:41:56.210608160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:56.212447 env[1255]: time="2025-05-17T00:41:56.210618381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:56.212447 env[1255]: time="2025-05-17T00:41:56.210785015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9294e4c27519267b917803ae60560b01e20428813f7812dc937ecac34c2fddb9 pid=1807 runtime=io.containerd.runc.v2 May 17 00:41:56.222115 env[1255]: time="2025-05-17T00:41:56.222073525Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:56.222201 env[1255]: time="2025-05-17T00:41:56.222119009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:56.222201 env[1255]: time="2025-05-17T00:41:56.222134576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:56.222320 env[1255]: time="2025-05-17T00:41:56.222298501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e23b6ec411e9cde08207937c9edd8067736636f6a3185f6cd830a9cbd687bc2 pid=1825 runtime=io.containerd.runc.v2 May 17 00:41:56.226158 systemd[1]: Started cri-containerd-9294e4c27519267b917803ae60560b01e20428813f7812dc937ecac34c2fddb9.scope. May 17 00:41:56.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.242000 audit: BPF prog-id=55 op=LOAD May 17 00:41:56.243310 env[1255]: time="2025-05-17T00:41:56.241664314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:56.243310 env[1255]: time="2025-05-17T00:41:56.241688461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:56.243310 env[1255]: time="2025-05-17T00:41:56.241906134Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:56.243310 env[1255]: time="2025-05-17T00:41:56.241975015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c78311b1b209b0f647a77d915825f6cc59714f6f83be0da9eacac6826ff92a93 pid=1864 runtime=io.containerd.runc.v2 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1807 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932393465346332373531393236376239313738303361653630353630 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1807 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932393465346332373531393236376239313738303361653630353630 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.243000 audit: BPF prog-id=56 op=LOAD May 17 00:41:56.243000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b0440 items=0 ppid=1807 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932393465346332373531393236376239313738303361653630353630 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit: BPF prog-id=57 op=LOAD May 17 00:41:56.244000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b0488 items=0 ppid=1807 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932393465346332373531393236376239313738303361653630353630 May 17 00:41:56.244000 audit: BPF prog-id=57 op=UNLOAD May 17 00:41:56.244000 audit: BPF prog-id=56 op=UNLOAD May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.244000 audit: BPF prog-id=58 op=LOAD May 17 00:41:56.244000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b0898 items=0 ppid=1807 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932393465346332373531393236376239313738303361653630353630 May 17 00:41:56.259900 systemd[1]: Started cri-containerd-7e23b6ec411e9cde08207937c9edd8067736636f6a3185f6cd830a9cbd687bc2.scope. May 17 00:41:56.273090 systemd[1]: Started cri-containerd-c78311b1b209b0f647a77d915825f6cc59714f6f83be0da9eacac6826ff92a93.scope. May 17 00:41:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit: BPF prog-id=59 op=LOAD May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1825 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765323362366563343131653963646530383230373933376339656464 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1825 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765323362366563343131653963646530383230373933376339656464 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit: BPF prog-id=60 op=LOAD May 17 00:41:56.279000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003445f0 items=0 ppid=1825 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765323362366563343131653963646530383230373933376339656464 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.279000 audit: BPF prog-id=61 op=LOAD May 17 00:41:56.279000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000344638 items=0 ppid=1825 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765323362366563343131653963646530383230373933376339656464 May 17 00:41:56.279000 audit: BPF prog-id=61 op=UNLOAD May 17 00:41:56.279000 audit: BPF prog-id=60 op=UNLOAD May 17 00:41:56.280000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.280000 audit: BPF prog-id=62 op=LOAD May 17 00:41:56.280000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000344a48 items=0 ppid=1825 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765323362366563343131653963646530383230373933376339656464 May 17 00:41:56.283202 env[1255]: time="2025-05-17T00:41:56.283173577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8fba52155e63f70cc922ab7cc8c200fd,Namespace:kube-system,Attempt:0,} returns sandbox id \"9294e4c27519267b917803ae60560b01e20428813f7812dc937ecac34c2fddb9\"" May 17 00:41:56.286000 env[1255]: time="2025-05-17T00:41:56.285977494Z" level=info msg="CreateContainer within sandbox \"9294e4c27519267b917803ae60560b01e20428813f7812dc937ecac34c2fddb9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:41:56.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.292000 audit: BPF prog-id=63 op=LOAD May 17 00:41:56.295687 env[1255]: time="2025-05-17T00:41:56.292860830Z" level=info msg="CreateContainer within sandbox \"9294e4c27519267b917803ae60560b01e20428813f7812dc937ecac34c2fddb9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4a7ec9fb6cff740d4a755b0e340ff2aa92d3afa29ff146ae54f4f6b2efc4d325\"" May 17 00:41:56.295687 env[1255]: time="2025-05-17T00:41:56.293361541Z" level=info msg="StartContainer for \"4a7ec9fb6cff740d4a755b0e340ff2aa92d3afa29ff146ae54f4f6b2efc4d325\"" May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1864 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383331316231623230396230663634376137376439313538323566 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1864 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383331316231623230396230663634376137376439313538323566 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit: BPF prog-id=64 op=LOAD May 17 00:41:56.295000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003161d0 items=0 ppid=1864 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383331316231623230396230663634376137376439313538323566 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit: BPF prog-id=65 op=LOAD May 17 00:41:56.295000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000316218 items=0 ppid=1864 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383331316231623230396230663634376137376439313538323566 May 17 00:41:56.295000 audit: BPF prog-id=65 op=UNLOAD May 17 00:41:56.295000 audit: BPF prog-id=64 op=UNLOAD May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.295000 audit: BPF prog-id=66 op=LOAD May 17 00:41:56.295000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000316628 items=0 ppid=1864 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383331316231623230396230663634376137376439313538323566 May 17 00:41:56.303204 kubelet[1765]: E0517 00:41:56.303178 1765 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://139.178.70.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:41:56.308847 systemd[1]: Started cri-containerd-4a7ec9fb6cff740d4a755b0e340ff2aa92d3afa29ff146ae54f4f6b2efc4d325.scope. May 17 00:41:56.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.323000 audit: BPF prog-id=67 op=LOAD May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1807 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461376563396662366366663734306434613735356230653334306666 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1807 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461376563396662366366663734306434613735356230653334306666 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit: BPF prog-id=68 op=LOAD May 17 00:41:56.324000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a3d30 items=0 ppid=1807 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461376563396662366366663734306434613735356230653334306666 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit: BPF prog-id=69 op=LOAD May 17 00:41:56.324000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a3d78 items=0 ppid=1807 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461376563396662366366663734306434613735356230653334306666 May 17 00:41:56.324000 audit: BPF prog-id=69 op=UNLOAD May 17 00:41:56.324000 audit: BPF prog-id=68 op=UNLOAD May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.324000 audit: BPF prog-id=70 op=LOAD May 17 00:41:56.324000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382188 items=0 ppid=1807 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461376563396662366366663734306434613735356230653334306666 May 17 00:41:56.332453 env[1255]: time="2025-05-17T00:41:56.331344383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:97963c41ada533e2e0872a518ecd4611,Namespace:kube-system,Attempt:0,} returns sandbox id \"7e23b6ec411e9cde08207937c9edd8067736636f6a3185f6cd830a9cbd687bc2\"" May 17 00:41:56.340136 env[1255]: time="2025-05-17T00:41:56.340109195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:fda54e39eada080929aa3294dbb84f99,Namespace:kube-system,Attempt:0,} returns sandbox id \"c78311b1b209b0f647a77d915825f6cc59714f6f83be0da9eacac6826ff92a93\"" May 17 00:41:56.350293 env[1255]: time="2025-05-17T00:41:56.350262328Z" level=info msg="CreateContainer within sandbox \"7e23b6ec411e9cde08207937c9edd8067736636f6a3185f6cd830a9cbd687bc2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:41:56.360218 env[1255]: time="2025-05-17T00:41:56.360192355Z" level=info msg="CreateContainer within sandbox \"c78311b1b209b0f647a77d915825f6cc59714f6f83be0da9eacac6826ff92a93\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:41:56.365154 env[1255]: time="2025-05-17T00:41:56.365126353Z" level=info msg="StartContainer for \"4a7ec9fb6cff740d4a755b0e340ff2aa92d3afa29ff146ae54f4f6b2efc4d325\" returns successfully" May 17 00:41:56.429218 kubelet[1765]: E0517 00:41:56.429191 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="1.6s" May 17 00:41:56.462739 env[1255]: time="2025-05-17T00:41:56.462706803Z" level=info msg="CreateContainer within sandbox \"7e23b6ec411e9cde08207937c9edd8067736636f6a3185f6cd830a9cbd687bc2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e774e3f48d372192e98b454092b9432947a1b71dd38957239472227cc197d6c2\"" May 17 00:41:56.463205 env[1255]: time="2025-05-17T00:41:56.463193575Z" level=info msg="StartContainer for \"e774e3f48d372192e98b454092b9432947a1b71dd38957239472227cc197d6c2\"" May 17 00:41:56.472869 systemd[1]: Started cri-containerd-e774e3f48d372192e98b454092b9432947a1b71dd38957239472227cc197d6c2.scope. May 17 00:41:56.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.487000 audit: BPF prog-id=71 op=LOAD May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1825 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373465336634386433373231393265393862343534303932623934 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1825 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373465336634386433373231393265393862343534303932623934 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit: BPF prog-id=72 op=LOAD May 17 00:41:56.488000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00025ded0 items=0 ppid=1825 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373465336634386433373231393265393862343534303932623934 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit: BPF prog-id=73 op=LOAD May 17 00:41:56.488000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00025df18 items=0 ppid=1825 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373465336634386433373231393265393862343534303932623934 May 17 00:41:56.488000 audit: BPF prog-id=73 op=UNLOAD May 17 00:41:56.488000 audit: BPF prog-id=72 op=UNLOAD May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.488000 audit: BPF prog-id=74 op=LOAD May 17 00:41:56.488000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000344328 items=0 ppid=1825 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373465336634386433373231393265393862343534303932623934 May 17 00:41:56.509839 env[1255]: time="2025-05-17T00:41:56.509814467Z" level=info msg="CreateContainer within sandbox \"c78311b1b209b0f647a77d915825f6cc59714f6f83be0da9eacac6826ff92a93\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"347a82a28ed67ca0af416eccb7f2abc21ade5cb4c0d63dc5262beff6e68b075d\"" May 17 00:41:56.510336 env[1255]: time="2025-05-17T00:41:56.510322884Z" level=info msg="StartContainer for \"347a82a28ed67ca0af416eccb7f2abc21ade5cb4c0d63dc5262beff6e68b075d\"" May 17 00:41:56.529826 systemd[1]: Started cri-containerd-347a82a28ed67ca0af416eccb7f2abc21ade5cb4c0d63dc5262beff6e68b075d.scope. May 17 00:41:56.532213 env[1255]: time="2025-05-17T00:41:56.532116383Z" level=info msg="StartContainer for \"e774e3f48d372192e98b454092b9432947a1b71dd38957239472227cc197d6c2\" returns successfully" May 17 00:41:56.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.541000 audit: BPF prog-id=75 op=LOAD May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1864 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334376138326132386564363763613061663431366563636237663261 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1864 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334376138326132386564363763613061663431366563636237663261 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit: BPF prog-id=76 op=LOAD May 17 00:41:56.542000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d10 items=0 ppid=1864 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334376138326132386564363763613061663431366563636237663261 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit: BPF prog-id=77 op=LOAD May 17 00:41:56.542000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d58 items=0 ppid=1864 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334376138326132386564363763613061663431366563636237663261 May 17 00:41:56.542000 audit: BPF prog-id=77 op=UNLOAD May 17 00:41:56.542000 audit: BPF prog-id=76 op=UNLOAD May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.542000 audit: BPF prog-id=78 op=LOAD May 17 00:41:56.542000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000366168 items=0 ppid=1864 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334376138326132386564363763613061663431366563636237663261 May 17 00:41:56.579994 env[1255]: time="2025-05-17T00:41:56.579964565Z" level=info msg="StartContainer for \"347a82a28ed67ca0af416eccb7f2abc21ade5cb4c0d63dc5262beff6e68b075d\" returns successfully" May 17 00:41:56.592325 kubelet[1765]: I0517 00:41:56.592275 1765 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:41:56.592633 kubelet[1765]: E0517 00:41:56.592619 1765 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" May 17 00:41:56.899950 kubelet[1765]: E0517 00:41:56.899930 1765 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://139.178.70.109:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:41:57.049408 kubelet[1765]: E0517 00:41:57.049353 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:57.050644 kubelet[1765]: E0517 00:41:57.050627 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:57.051749 kubelet[1765]: E0517 00:41:57.051733 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:58.030507 kubelet[1765]: E0517 00:41:58.030475 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="3.2s" May 17 00:41:58.053533 kubelet[1765]: E0517 00:41:58.053518 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:58.053916 kubelet[1765]: E0517 00:41:58.053908 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:58.193631 kubelet[1765]: I0517 00:41:58.193616 1765 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:41:58.412000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:58.420452 kernel: kauditd_printk_skb: 691 callbacks suppressed May 17 00:41:58.420514 kernel: audit: type=1400 audit(1747442518.412:488): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:58.412000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007181e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:41:58.427370 kernel: audit: type=1300 audit(1747442518.412:488): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007181e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:41:58.427415 kernel: audit: type=1327 audit(1747442518.412:488): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:58.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:58.412000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:58.433801 kernel: audit: type=1400 audit(1747442518.412:489): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:58.433838 kernel: audit: type=1300 audit(1747442518.412:489): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000916120 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:41:58.412000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000916120 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:41:58.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:58.441366 kernel: audit: type=1327 audit(1747442518.412:489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:59.194363 kubelet[1765]: E0517 00:41:59.194343 1765 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:41:59.620000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.620000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5212 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.628120 kernel: audit: type=1400 audit(1747442519.620:490): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.628154 kernel: audit: type=1400 audit(1747442519.620:491): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5212 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.620000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008ac8600 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.632119 kernel: audit: type=1300 audit(1747442519.620:491): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008ac8600 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.632152 kernel: audit: type=1327 audit(1747442519.620:491): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.620000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.620000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c008b5dbc0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.620000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.626000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.626000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c001ef7420 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.626000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.634000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.634000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c008b5dec0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.634000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.697000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.697000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c00750b600 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.697000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.697000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:59.697000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0069c7860 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:41:59.697000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:41:59.890340 kubelet[1765]: I0517 00:41:59.890267 1765 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 17 00:41:59.890340 kubelet[1765]: E0517 00:41:59.890292 1765 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 17 00:41:59.925607 kubelet[1765]: I0517 00:41:59.925585 1765 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:41:59.944370 kubelet[1765]: E0517 00:41:59.944342 1765 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 17 00:41:59.944370 kubelet[1765]: I0517 00:41:59.944363 1765 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:41:59.945881 kubelet[1765]: E0517 00:41:59.945840 1765 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 17 00:41:59.945881 kubelet[1765]: I0517 00:41:59.945881 1765 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:41:59.947074 kubelet[1765]: I0517 00:41:59.947049 1765 apiserver.go:52] "Watching apiserver" May 17 00:41:59.947450 kubelet[1765]: E0517 00:41:59.947433 1765 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 17 00:42:00.027643 kubelet[1765]: I0517 00:42:00.027611 1765 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:42:01.848516 systemd[1]: Reloading. May 17 00:42:01.905300 /usr/lib/systemd/system-generators/torcx-generator[2061]: time="2025-05-17T00:42:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:01.905317 /usr/lib/systemd/system-generators/torcx-generator[2061]: time="2025-05-17T00:42:01Z" level=info msg="torcx already run" May 17 00:42:01.958332 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:42:01.958460 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:42:01.971022 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:42:02.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit: BPF prog-id=79 op=LOAD May 17 00:42:02.027000 audit: BPF prog-id=40 op=UNLOAD May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit: BPF prog-id=80 op=LOAD May 17 00:42:02.027000 audit: BPF prog-id=67 op=UNLOAD May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit: BPF prog-id=81 op=LOAD May 17 00:42:02.028000 audit: BPF prog-id=55 op=UNLOAD May 17 00:42:02.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.028000 audit: BPF prog-id=82 op=LOAD May 17 00:42:02.028000 audit: BPF prog-id=41 op=UNLOAD May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit: BPF prog-id=83 op=LOAD May 17 00:42:02.029000 audit: BPF prog-id=59 op=UNLOAD May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.029000 audit: BPF prog-id=84 op=LOAD May 17 00:42:02.029000 audit: BPF prog-id=42 op=UNLOAD May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit: BPF prog-id=85 op=LOAD May 17 00:42:02.030000 audit: BPF prog-id=43 op=UNLOAD May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit: BPF prog-id=86 op=LOAD May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.030000 audit: BPF prog-id=87 op=LOAD May 17 00:42:02.030000 audit: BPF prog-id=44 op=UNLOAD May 17 00:42:02.030000 audit: BPF prog-id=45 op=UNLOAD May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit: BPF prog-id=88 op=LOAD May 17 00:42:02.031000 audit: BPF prog-id=63 op=UNLOAD May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit: BPF prog-id=89 op=LOAD May 17 00:42:02.031000 audit: BPF prog-id=46 op=UNLOAD May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit: BPF prog-id=90 op=LOAD May 17 00:42:02.032000 audit: BPF prog-id=75 op=UNLOAD May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit: BPF prog-id=91 op=LOAD May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.032000 audit: BPF prog-id=92 op=LOAD May 17 00:42:02.032000 audit: BPF prog-id=47 op=UNLOAD May 17 00:42:02.032000 audit: BPF prog-id=48 op=UNLOAD May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit: BPF prog-id=93 op=LOAD May 17 00:42:02.033000 audit: BPF prog-id=71 op=UNLOAD May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit: BPF prog-id=94 op=LOAD May 17 00:42:02.033000 audit: BPF prog-id=49 op=UNLOAD May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit: BPF prog-id=95 op=LOAD May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit: BPF prog-id=96 op=LOAD May 17 00:42:02.034000 audit: BPF prog-id=50 op=UNLOAD May 17 00:42:02.034000 audit: BPF prog-id=51 op=UNLOAD May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit: BPF prog-id=97 op=LOAD May 17 00:42:02.034000 audit: BPF prog-id=52 op=UNLOAD May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit: BPF prog-id=98 op=LOAD May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.035000 audit: BPF prog-id=99 op=LOAD May 17 00:42:02.035000 audit: BPF prog-id=53 op=UNLOAD May 17 00:42:02.035000 audit: BPF prog-id=54 op=UNLOAD May 17 00:42:02.047858 systemd[1]: Stopping kubelet.service... May 17 00:42:02.068578 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:42:02.068696 systemd[1]: Stopped kubelet.service. May 17 00:42:02.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:02.070270 systemd[1]: Starting kubelet.service... May 17 00:42:04.968043 kernel: kauditd_printk_skb: 259 callbacks suppressed May 17 00:42:04.968158 kernel: audit: type=1130 audit(1747442524.963:741): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:04.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:04.964432 systemd[1]: Started kubelet.service. May 17 00:42:05.022624 kubelet[2126]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:42:05.022900 kubelet[2126]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:42:05.022944 kubelet[2126]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:42:05.023029 kubelet[2126]: I0517 00:42:05.023011 2126 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:42:05.034253 kubelet[2126]: I0517 00:42:05.034229 2126 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:42:05.034400 kubelet[2126]: I0517 00:42:05.034391 2126 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:42:05.034755 kubelet[2126]: I0517 00:42:05.034745 2126 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:42:05.041721 kubelet[2126]: I0517 00:42:05.041700 2126 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 17 00:42:05.058577 kubelet[2126]: I0517 00:42:05.058551 2126 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:42:05.107277 kubelet[2126]: E0517 00:42:05.107256 2126 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:42:05.107430 kubelet[2126]: I0517 00:42:05.107417 2126 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:42:05.109046 kubelet[2126]: I0517 00:42:05.109035 2126 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:42:05.113833 kubelet[2126]: I0517 00:42:05.113813 2126 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:42:05.113995 kubelet[2126]: I0517 00:42:05.113896 2126 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:42:05.114101 kubelet[2126]: I0517 00:42:05.114092 2126 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:42:05.114149 kubelet[2126]: I0517 00:42:05.114142 2126 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:42:05.118821 kubelet[2126]: I0517 00:42:05.118811 2126 state_mem.go:36] "Initialized new in-memory state store" May 17 00:42:05.127595 kubelet[2126]: I0517 00:42:05.127586 2126 kubelet.go:480] "Attempting to sync node with API server" May 17 00:42:05.127654 kubelet[2126]: I0517 00:42:05.127646 2126 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:42:05.127710 kubelet[2126]: I0517 00:42:05.127703 2126 kubelet.go:386] "Adding apiserver pod source" May 17 00:42:05.127764 kubelet[2126]: I0517 00:42:05.127757 2126 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:42:05.203704 kubelet[2126]: I0517 00:42:05.203661 2126 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:42:05.211817 kubelet[2126]: I0517 00:42:05.211802 2126 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:42:05.234085 kubelet[2126]: I0517 00:42:05.233447 2126 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:42:05.234085 kubelet[2126]: I0517 00:42:05.233478 2126 server.go:1289] "Started kubelet" May 17 00:42:05.234085 kubelet[2126]: I0517 00:42:05.233606 2126 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:42:05.234268 kubelet[2126]: I0517 00:42:05.234255 2126 server.go:317] "Adding debug handlers to kubelet server" May 17 00:42:05.255000 audit[2126]: AVC avc: denied { mac_admin } for pid=2126 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:05.257508 kubelet[2126]: I0517 00:42:05.257194 2126 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:42:05.257508 kubelet[2126]: I0517 00:42:05.257217 2126 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:42:05.257508 kubelet[2126]: I0517 00:42:05.257235 2126 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:42:05.255000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:05.261388 kernel: audit: type=1400 audit(1747442525.255:742): avc: denied { mac_admin } for pid=2126 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:05.261422 kernel: audit: type=1401 audit(1747442525.255:742): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:05.261438 kernel: audit: type=1300 audit(1747442525.255:742): arch=c000003e syscall=188 success=no exit=-22 a0=c000700150 a1=c000b68e88 a2=c000700120 a3=25 items=0 ppid=1 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:05.255000 audit[2126]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000700150 a1=c000b68e88 a2=c000700120 a3=25 items=0 ppid=1 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:05.264944 kernel: audit: type=1327 audit(1747442525.255:742): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:05.255000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:05.255000 audit[2126]: AVC avc: denied { mac_admin } for pid=2126 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:05.270658 kernel: audit: type=1400 audit(1747442525.255:743): avc: denied { mac_admin } for pid=2126 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:05.270689 kernel: audit: type=1401 audit(1747442525.255:743): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:05.255000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:05.255000 audit[2126]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b75620 a1=c000b68ea0 a2=c0007001e0 a3=25 items=0 ppid=1 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:05.275507 kernel: audit: type=1300 audit(1747442525.255:743): arch=c000003e syscall=188 success=no exit=-22 a0=c000b75620 a1=c000b68ea0 a2=c0007001e0 a3=25 items=0 ppid=1 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:05.275534 kernel: audit: type=1327 audit(1747442525.255:743): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:05.255000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:05.275966 kubelet[2126]: I0517 00:42:05.275934 2126 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:42:05.276151 kubelet[2126]: I0517 00:42:05.276143 2126 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:42:05.276588 kubelet[2126]: I0517 00:42:05.276579 2126 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:42:05.278509 kubelet[2126]: I0517 00:42:05.278501 2126 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:42:05.278620 kubelet[2126]: I0517 00:42:05.278612 2126 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:42:05.278722 kubelet[2126]: I0517 00:42:05.278716 2126 reconciler.go:26] "Reconciler: start to sync state" May 17 00:42:05.280275 kubelet[2126]: I0517 00:42:05.280069 2126 factory.go:223] Registration of the systemd container factory successfully May 17 00:42:05.280275 kubelet[2126]: I0517 00:42:05.280127 2126 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:42:05.309989 kubelet[2126]: I0517 00:42:05.309963 2126 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:42:05.310509 kubelet[2126]: I0517 00:42:05.310496 2126 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:42:05.310509 kubelet[2126]: I0517 00:42:05.310510 2126 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:42:05.310566 kubelet[2126]: I0517 00:42:05.310522 2126 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:42:05.310566 kubelet[2126]: I0517 00:42:05.310527 2126 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:42:05.310566 kubelet[2126]: E0517 00:42:05.310558 2126 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:42:05.316837 kubelet[2126]: E0517 00:42:05.316818 2126 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:42:05.337752 kubelet[2126]: I0517 00:42:05.337701 2126 factory.go:223] Registration of the containerd container factory successfully May 17 00:42:05.369471 kubelet[2126]: I0517 00:42:05.369456 2126 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:42:05.369573 kubelet[2126]: I0517 00:42:05.369563 2126 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:42:05.369622 kubelet[2126]: I0517 00:42:05.369616 2126 state_mem.go:36] "Initialized new in-memory state store" May 17 00:42:05.369734 kubelet[2126]: I0517 00:42:05.369726 2126 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:42:05.369786 kubelet[2126]: I0517 00:42:05.369772 2126 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:42:05.369831 kubelet[2126]: I0517 00:42:05.369825 2126 policy_none.go:49] "None policy: Start" May 17 00:42:05.369877 kubelet[2126]: I0517 00:42:05.369870 2126 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:42:05.369922 kubelet[2126]: I0517 00:42:05.369915 2126 state_mem.go:35] "Initializing new in-memory state store" May 17 00:42:05.370015 kubelet[2126]: I0517 00:42:05.370008 2126 state_mem.go:75] "Updated machine memory state" May 17 00:42:05.372455 kubelet[2126]: E0517 00:42:05.372446 2126 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:42:05.371000 audit[2126]: AVC avc: denied { mac_admin } for pid=2126 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:05.371000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:42:05.371000 audit[2126]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008ce5d0 a1=c0009112d8 a2=c0008ce5a0 a3=25 items=0 ppid=1 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:05.371000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:42:05.375257 kubelet[2126]: E0517 00:42:05.375247 2126 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:42:05.375370 kubelet[2126]: I0517 00:42:05.375363 2126 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:42:05.375409 kernel: audit: type=1400 audit(1747442525.371:744): avc: denied { mac_admin } for pid=2126 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:05.375458 kubelet[2126]: I0517 00:42:05.375441 2126 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:42:05.376390 kubelet[2126]: I0517 00:42:05.376077 2126 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:42:05.378169 kubelet[2126]: E0517 00:42:05.378154 2126 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:42:05.450443 kubelet[2126]: I0517 00:42:05.450416 2126 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:42:05.452130 kubelet[2126]: I0517 00:42:05.452119 2126 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:42:05.452530 kubelet[2126]: I0517 00:42:05.452520 2126 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:42:05.482172 kubelet[2126]: I0517 00:42:05.482153 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fda54e39eada080929aa3294dbb84f99-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"fda54e39eada080929aa3294dbb84f99\") " pod="kube-system/kube-apiserver-localhost" May 17 00:42:05.482172 kubelet[2126]: I0517 00:42:05.482174 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fda54e39eada080929aa3294dbb84f99-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"fda54e39eada080929aa3294dbb84f99\") " pod="kube-system/kube-apiserver-localhost" May 17 00:42:05.482278 kubelet[2126]: I0517 00:42:05.482186 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fda54e39eada080929aa3294dbb84f99-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"fda54e39eada080929aa3294dbb84f99\") " pod="kube-system/kube-apiserver-localhost" May 17 00:42:05.482278 kubelet[2126]: I0517 00:42:05.482197 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:42:05.482278 kubelet[2126]: I0517 00:42:05.482208 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:42:05.482278 kubelet[2126]: I0517 00:42:05.482218 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:42:05.482278 kubelet[2126]: I0517 00:42:05.482227 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:42:05.482402 kubelet[2126]: I0517 00:42:05.482236 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:42:05.482402 kubelet[2126]: I0517 00:42:05.482246 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8fba52155e63f70cc922ab7cc8c200fd-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8fba52155e63f70cc922ab7cc8c200fd\") " pod="kube-system/kube-scheduler-localhost" May 17 00:42:05.482475 kubelet[2126]: I0517 00:42:05.482467 2126 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:42:05.488636 kubelet[2126]: I0517 00:42:05.488576 2126 kubelet_node_status.go:124] "Node was previously registered" node="localhost" May 17 00:42:05.488761 kubelet[2126]: I0517 00:42:05.488754 2126 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 17 00:42:05.536000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=5243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:42:05.536000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000afc600 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:05.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:06.131255 kubelet[2126]: I0517 00:42:06.131231 2126 apiserver.go:52] "Watching apiserver" May 17 00:42:06.178970 kubelet[2126]: I0517 00:42:06.178943 2126 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:42:06.320120 kubelet[2126]: I0517 00:42:06.320106 2126 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:42:06.337740 kubelet[2126]: E0517 00:42:06.337443 2126 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 17 00:42:06.337000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.337000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00092db60 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:06.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:06.337000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.337000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00092dba0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:06.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:06.337000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.337000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00092dbe0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:06.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:06.337000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:06.337000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006a60e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:06.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:06.351410 kubelet[2126]: I0517 00:42:06.351354 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.351342732 podStartE2EDuration="1.351342732s" podCreationTimestamp="2025-05-17 00:42:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:06.346969025 +0000 UTC m=+1.362550233" watchObservedRunningTime="2025-05-17 00:42:06.351342732 +0000 UTC m=+1.366923938" May 17 00:42:06.355936 kubelet[2126]: I0517 00:42:06.355904 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.3558920030000001 podStartE2EDuration="1.355892003s" podCreationTimestamp="2025-05-17 00:42:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:06.351727284 +0000 UTC m=+1.367308496" watchObservedRunningTime="2025-05-17 00:42:06.355892003 +0000 UTC m=+1.371473204" May 17 00:42:06.362239 kubelet[2126]: I0517 00:42:06.362209 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.362199186 podStartE2EDuration="1.362199186s" podCreationTimestamp="2025-05-17 00:42:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:06.356130512 +0000 UTC m=+1.371711712" watchObservedRunningTime="2025-05-17 00:42:06.362199186 +0000 UTC m=+1.377780398" May 17 00:42:08.640987 kubelet[2126]: I0517 00:42:08.640970 2126 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:42:08.641486 env[1255]: time="2025-05-17T00:42:08.641458536Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:42:08.641771 kubelet[2126]: I0517 00:42:08.641762 2126 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:42:09.550639 systemd[1]: Created slice kubepods-besteffort-pod4b4caceb_27ca_434a_8cbd_7aa6f49fd02b.slice. May 17 00:42:09.551360 kubelet[2126]: E0517 00:42:09.551344 2126 reflector.go:200] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" reflector="object-\"kube-system\"/\"kube-root-ca.crt\"" type="*v1.ConfigMap" May 17 00:42:09.551461 kubelet[2126]: I0517 00:42:09.551445 2126 status_manager.go:895] "Failed to get status for pod" podUID="4b4caceb-27ca-434a-8cbd-7aa6f49fd02b" pod="kube-system/kube-proxy-dsdrp" err="pods \"kube-proxy-dsdrp\" is forbidden: User \"system:node:localhost\" cannot get resource \"pods\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'localhost' and this object" May 17 00:42:09.605746 kubelet[2126]: I0517 00:42:09.605715 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4b4caceb-27ca-434a-8cbd-7aa6f49fd02b-xtables-lock\") pod \"kube-proxy-dsdrp\" (UID: \"4b4caceb-27ca-434a-8cbd-7aa6f49fd02b\") " pod="kube-system/kube-proxy-dsdrp" May 17 00:42:09.605891 kubelet[2126]: I0517 00:42:09.605881 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4b4caceb-27ca-434a-8cbd-7aa6f49fd02b-lib-modules\") pod \"kube-proxy-dsdrp\" (UID: \"4b4caceb-27ca-434a-8cbd-7aa6f49fd02b\") " pod="kube-system/kube-proxy-dsdrp" May 17 00:42:09.605962 kubelet[2126]: I0517 00:42:09.605953 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4b4caceb-27ca-434a-8cbd-7aa6f49fd02b-kube-proxy\") pod \"kube-proxy-dsdrp\" (UID: \"4b4caceb-27ca-434a-8cbd-7aa6f49fd02b\") " pod="kube-system/kube-proxy-dsdrp" May 17 00:42:09.606036 kubelet[2126]: I0517 00:42:09.606026 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rfqxv\" (UniqueName: \"kubernetes.io/projected/4b4caceb-27ca-434a-8cbd-7aa6f49fd02b-kube-api-access-rfqxv\") pod \"kube-proxy-dsdrp\" (UID: \"4b4caceb-27ca-434a-8cbd-7aa6f49fd02b\") " pod="kube-system/kube-proxy-dsdrp" May 17 00:42:09.697971 systemd[1]: Created slice kubepods-besteffort-pod2fc27b3b_593b_4f99_a99d_fefdc07d09ff.slice. May 17 00:42:09.706636 kubelet[2126]: I0517 00:42:09.706613 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2fc27b3b-593b-4f99-a99d-fefdc07d09ff-var-lib-calico\") pod \"tigera-operator-844669ff44-cdx7b\" (UID: \"2fc27b3b-593b-4f99-a99d-fefdc07d09ff\") " pod="tigera-operator/tigera-operator-844669ff44-cdx7b" May 17 00:42:09.706904 kubelet[2126]: I0517 00:42:09.706892 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nkhzr\" (UniqueName: \"kubernetes.io/projected/2fc27b3b-593b-4f99-a99d-fefdc07d09ff-kube-api-access-nkhzr\") pod \"tigera-operator-844669ff44-cdx7b\" (UID: \"2fc27b3b-593b-4f99-a99d-fefdc07d09ff\") " pod="tigera-operator/tigera-operator-844669ff44-cdx7b" May 17 00:42:09.810899 kubelet[2126]: I0517 00:42:09.810838 2126 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:42:10.000276 env[1255]: time="2025-05-17T00:42:10.000242025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-cdx7b,Uid:2fc27b3b-593b-4f99-a99d-fefdc07d09ff,Namespace:tigera-operator,Attempt:0,}" May 17 00:42:10.012292 env[1255]: time="2025-05-17T00:42:10.012249944Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:10.012429 env[1255]: time="2025-05-17T00:42:10.012415490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:10.012506 env[1255]: time="2025-05-17T00:42:10.012479435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:10.012692 env[1255]: time="2025-05-17T00:42:10.012666265Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8690f8a60da47f4ce49b241ee2517852a3c4dd1d3972cff475782094e5def3c pid=2182 runtime=io.containerd.runc.v2 May 17 00:42:10.024779 systemd[1]: Started cri-containerd-e8690f8a60da47f4ce49b241ee2517852a3c4dd1d3972cff475782094e5def3c.scope. May 17 00:42:10.038500 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:42:10.038576 kernel: audit: type=1400 audit(1747442530.031:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.038600 kernel: audit: type=1400 audit(1747442530.031:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.041079 kernel: audit: type=1400 audit(1747442530.031:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.046488 kernel: audit: type=1400 audit(1747442530.031:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.046526 kernel: audit: type=1400 audit(1747442530.031:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.050390 kernel: audit: type=1400 audit(1747442530.031:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.053390 kernel: audit: type=1400 audit(1747442530.031:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.056393 kernel: audit: type=1400 audit(1747442530.031:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.059388 kernel: audit: type=1400 audit(1747442530.031:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.062387 kernel: audit: type=1400 audit(1747442530.035:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit: BPF prog-id=100 op=LOAD May 17 00:42:10.035000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363930663861363064613437663463653439623234316565323531 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363930663861363064613437663463653439623234316565323531 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.035000 audit: BPF prog-id=101 op=LOAD May 17 00:42:10.035000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00029ddc0 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363930663861363064613437663463653439623234316565323531 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit: BPF prog-id=102 op=LOAD May 17 00:42:10.037000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00029de08 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363930663861363064613437663463653439623234316565323531 May 17 00:42:10.037000 audit: BPF prog-id=102 op=UNLOAD May 17 00:42:10.037000 audit: BPF prog-id=101 op=UNLOAD May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:10.037000 audit: BPF prog-id=103 op=LOAD May 17 00:42:10.037000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fc218 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363930663861363064613437663463653439623234316565323531 May 17 00:42:10.077769 env[1255]: time="2025-05-17T00:42:10.077743312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-cdx7b,Uid:2fc27b3b-593b-4f99-a99d-fefdc07d09ff,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e8690f8a60da47f4ce49b241ee2517852a3c4dd1d3972cff475782094e5def3c\"" May 17 00:42:10.079976 env[1255]: time="2025-05-17T00:42:10.079950057Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:42:10.722848 kubelet[2126]: E0517 00:42:10.722814 2126 projected.go:289] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 00:42:10.723200 kubelet[2126]: E0517 00:42:10.723178 2126 projected.go:194] Error preparing data for projected volume kube-api-access-rfqxv for pod kube-system/kube-proxy-dsdrp: failed to sync configmap cache: timed out waiting for the condition May 17 00:42:10.723313 kubelet[2126]: E0517 00:42:10.723303 2126 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/4b4caceb-27ca-434a-8cbd-7aa6f49fd02b-kube-api-access-rfqxv podName:4b4caceb-27ca-434a-8cbd-7aa6f49fd02b nodeName:}" failed. No retries permitted until 2025-05-17 00:42:11.223284917 +0000 UTC m=+6.238866125 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-rfqxv" (UniqueName: "kubernetes.io/projected/4b4caceb-27ca-434a-8cbd-7aa6f49fd02b-kube-api-access-rfqxv") pod "kube-proxy-dsdrp" (UID: "4b4caceb-27ca-434a-8cbd-7aa6f49fd02b") : failed to sync configmap cache: timed out waiting for the condition May 17 00:42:10.814296 systemd[1]: run-containerd-runc-k8s.io-e8690f8a60da47f4ce49b241ee2517852a3c4dd1d3972cff475782094e5def3c-runc.rKOdaR.mount: Deactivated successfully. May 17 00:42:11.357669 env[1255]: time="2025-05-17T00:42:11.357640005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dsdrp,Uid:4b4caceb-27ca-434a-8cbd-7aa6f49fd02b,Namespace:kube-system,Attempt:0,}" May 17 00:42:11.431453 env[1255]: time="2025-05-17T00:42:11.431406761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:11.433655 env[1255]: time="2025-05-17T00:42:11.431434834Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:11.433655 env[1255]: time="2025-05-17T00:42:11.431441853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:11.433655 env[1255]: time="2025-05-17T00:42:11.431592085Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/025987b06514480efc1abd8f6b42a10510e7c7b11d24041541fa9ae470389f99 pid=2225 runtime=io.containerd.runc.v2 May 17 00:42:11.446021 systemd[1]: Started cri-containerd-025987b06514480efc1abd8f6b42a10510e7c7b11d24041541fa9ae470389f99.scope. May 17 00:42:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit: BPF prog-id=104 op=LOAD May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353938376230363531343438306566633161626438663662343261 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353938376230363531343438306566633161626438663662343261 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit: BPF prog-id=105 op=LOAD May 17 00:42:11.454000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00018d140 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353938376230363531343438306566633161626438663662343261 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit: BPF prog-id=106 op=LOAD May 17 00:42:11.454000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00018d188 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353938376230363531343438306566633161626438663662343261 May 17 00:42:11.454000 audit: BPF prog-id=106 op=UNLOAD May 17 00:42:11.454000 audit: BPF prog-id=105 op=UNLOAD May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.454000 audit: BPF prog-id=107 op=LOAD May 17 00:42:11.454000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00018d598 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353938376230363531343438306566633161626438663662343261 May 17 00:42:11.463534 env[1255]: time="2025-05-17T00:42:11.463505740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dsdrp,Uid:4b4caceb-27ca-434a-8cbd-7aa6f49fd02b,Namespace:kube-system,Attempt:0,} returns sandbox id \"025987b06514480efc1abd8f6b42a10510e7c7b11d24041541fa9ae470389f99\"" May 17 00:42:11.470676 env[1255]: time="2025-05-17T00:42:11.470640468Z" level=info msg="CreateContainer within sandbox \"025987b06514480efc1abd8f6b42a10510e7c7b11d24041541fa9ae470389f99\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:42:11.545476 env[1255]: time="2025-05-17T00:42:11.545435716Z" level=info msg="CreateContainer within sandbox \"025987b06514480efc1abd8f6b42a10510e7c7b11d24041541fa9ae470389f99\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"07d59c5a89a9ab75e58330a308a92a9fd43e116ba988d8357a141c31996c0060\"" May 17 00:42:11.546853 env[1255]: time="2025-05-17T00:42:11.546163702Z" level=info msg="StartContainer for \"07d59c5a89a9ab75e58330a308a92a9fd43e116ba988d8357a141c31996c0060\"" May 17 00:42:11.556591 systemd[1]: Started cri-containerd-07d59c5a89a9ab75e58330a308a92a9fd43e116ba988d8357a141c31996c0060.scope. May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f57781dbab8 items=0 ppid=2225 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037643539633561383961396162373565353833333061333038613932 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit: BPF prog-id=108 op=LOAD May 17 00:42:11.574000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a54d8 items=0 ppid=2225 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037643539633561383961396162373565353833333061333038613932 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.574000 audit: BPF prog-id=109 op=LOAD May 17 00:42:11.574000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a5528 items=0 ppid=2225 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037643539633561383961396162373565353833333061333038613932 May 17 00:42:11.575000 audit: BPF prog-id=109 op=UNLOAD May 17 00:42:11.575000 audit: BPF prog-id=108 op=UNLOAD May 17 00:42:11.575000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.575000 audit: BPF prog-id=110 op=LOAD May 17 00:42:11.575000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a55b8 items=0 ppid=2225 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037643539633561383961396162373565353833333061333038613932 May 17 00:42:11.612606 env[1255]: time="2025-05-17T00:42:11.612522839Z" level=info msg="StartContainer for \"07d59c5a89a9ab75e58330a308a92a9fd43e116ba988d8357a141c31996c0060\" returns successfully" May 17 00:42:11.814807 systemd[1]: run-containerd-runc-k8s.io-025987b06514480efc1abd8f6b42a10510e7c7b11d24041541fa9ae470389f99-runc.KfBXqE.mount: Deactivated successfully. May 17 00:42:12.335568 kubelet[2126]: I0517 00:42:12.335334 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-dsdrp" podStartSLOduration=3.335322965 podStartE2EDuration="3.335322965s" podCreationTimestamp="2025-05-17 00:42:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:12.334825192 +0000 UTC m=+7.350406396" watchObservedRunningTime="2025-05-17 00:42:12.335322965 +0000 UTC m=+7.350904171" May 17 00:42:12.451000 audit[2330]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.451000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdad7eb7a0 a2=0 a3=7ffdad7eb78c items=0 ppid=2280 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:42:12.451000 audit[2331]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.451000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff22f55aa0 a2=0 a3=7fff22f55a8c items=0 ppid=2280 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:42:12.452000 audit[2333]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.452000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7689f460 a2=0 a3=7ffd7689f44c items=0 ppid=2280 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:42:12.453000 audit[2334]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.453000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd223bce80 a2=0 a3=7ffd223bce6c items=0 ppid=2280 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:42:12.454000 audit[2335]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.454000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff72d3f6b0 a2=0 a3=7fff72d3f69c items=0 ppid=2280 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:42:12.454000 audit[2336]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.454000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe030e1d0 a2=0 a3=7fffe030e1bc items=0 ppid=2280 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:42:12.561000 audit[2339]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.561000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe87f6b7a0 a2=0 a3=7ffe87f6b78c items=0 ppid=2280 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:42:12.579000 audit[2341]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.579000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffaf5ed7e0 a2=0 a3=7fffaf5ed7cc items=0 ppid=2280 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:42:12.589000 audit[2344]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.589000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd43456d80 a2=0 a3=7ffd43456d6c items=0 ppid=2280 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:42:12.589000 audit[2345]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.589000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc4afd9e0 a2=0 a3=7fffc4afd9cc items=0 ppid=2280 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:42:12.591000 audit[2347]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.591000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff42924da0 a2=0 a3=7fff42924d8c items=0 ppid=2280 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:42:12.591000 audit[2348]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.591000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe087c3990 a2=0 a3=7ffe087c397c items=0 ppid=2280 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:42:12.593000 audit[2350]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.593000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc34963fc0 a2=0 a3=7ffc34963fac items=0 ppid=2280 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:42:12.595000 audit[2353]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.595000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd66003b0 a2=0 a3=7fffd660039c items=0 ppid=2280 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:42:12.596000 audit[2354]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.596000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd53a34ca0 a2=0 a3=7ffd53a34c8c items=0 ppid=2280 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:42:12.597000 audit[2356]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.597000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb86aa280 a2=0 a3=7ffeb86aa26c items=0 ppid=2280 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:42:12.598000 audit[2357]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.598000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe035f920 a2=0 a3=7fffe035f90c items=0 ppid=2280 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:42:12.600000 audit[2359]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.600000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda723bc70 a2=0 a3=7ffda723bc5c items=0 ppid=2280 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:42:12.602000 audit[2362]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.602000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc42046b50 a2=0 a3=7ffc42046b3c items=0 ppid=2280 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:42:12.604000 audit[2365]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.604000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1b486f10 a2=0 a3=7ffe1b486efc items=0 ppid=2280 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:42:12.605000 audit[2366]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.605000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa07d4270 a2=0 a3=7fffa07d425c items=0 ppid=2280 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:42:12.613000 audit[2368]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.613000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc13410c70 a2=0 a3=7ffc13410c5c items=0 ppid=2280 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:12.616000 audit[2371]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.616000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3feee740 a2=0 a3=7fff3feee72c items=0 ppid=2280 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:12.617000 audit[2372]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.617000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd74e244a0 a2=0 a3=7ffd74e2448c items=0 ppid=2280 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:42:12.618000 audit[2374]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:42:12.618000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffed6089640 a2=0 a3=7ffed608962c items=0 ppid=2280 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:42:12.675000 audit[2380]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:12.675000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe30c4ef50 a2=0 a3=7ffe30c4ef3c items=0 ppid=2280 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:12.682000 audit[2380]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:12.682000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe30c4ef50 a2=0 a3=7ffe30c4ef3c items=0 ppid=2280 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:12.683000 audit[2385]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.683000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd5520ce0 a2=0 a3=7ffdd5520ccc items=0 ppid=2280 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:42:12.685000 audit[2387]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.685000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc34fc5990 a2=0 a3=7ffc34fc597c items=0 ppid=2280 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:42:12.687000 audit[2390]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.687000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf12e33a0 a2=0 a3=7ffdf12e338c items=0 ppid=2280 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:42:12.688000 audit[2391]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.688000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee08db3b0 a2=0 a3=7ffee08db39c items=0 ppid=2280 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:42:12.689000 audit[2393]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.689000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc69ac150 a2=0 a3=7fffc69ac13c items=0 ppid=2280 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:42:12.690000 audit[2394]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.690000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdabfb15f0 a2=0 a3=7ffdabfb15dc items=0 ppid=2280 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:42:12.691000 audit[2396]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.691000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffead7c2c60 a2=0 a3=7ffead7c2c4c items=0 ppid=2280 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:42:12.693000 audit[2399]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.693000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe45c55420 a2=0 a3=7ffe45c5540c items=0 ppid=2280 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:42:12.694000 audit[2400]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.694000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff20bc1080 a2=0 a3=7fff20bc106c items=0 ppid=2280 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:42:12.695000 audit[2402]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.695000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2f454910 a2=0 a3=7ffd2f4548fc items=0 ppid=2280 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:42:12.696000 audit[2403]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.696000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb68a4560 a2=0 a3=7ffeb68a454c items=0 ppid=2280 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:42:12.697000 audit[2405]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.697000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0fa70600 a2=0 a3=7ffc0fa705ec items=0 ppid=2280 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:42:12.700000 audit[2408]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.700000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe05702be0 a2=0 a3=7ffe05702bcc items=0 ppid=2280 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:42:12.702000 audit[2411]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.702000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7ec92830 a2=0 a3=7fff7ec9281c items=0 ppid=2280 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:42:12.702000 audit[2412]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.702000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc51f00660 a2=0 a3=7ffc51f0064c items=0 ppid=2280 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:42:12.703000 audit[2414]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.703000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd43bc2b50 a2=0 a3=7ffd43bc2b3c items=0 ppid=2280 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:12.705000 audit[2417]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.705000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff6ff9da40 a2=0 a3=7fff6ff9da2c items=0 ppid=2280 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:42:12.706000 audit[2418]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.706000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff04c2aac0 a2=0 a3=7fff04c2aaac items=0 ppid=2280 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:42:12.707000 audit[2420]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.707000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff22510cb0 a2=0 a3=7fff22510c9c items=0 ppid=2280 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:42:12.708000 audit[2421]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.708000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe94d80160 a2=0 a3=7ffe94d8014c items=0 ppid=2280 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:42:12.709000 audit[2423]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.709000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfb7a8770 a2=0 a3=7ffdfb7a875c items=0 ppid=2280 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:42:12.711000 audit[2426]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:42:12.711000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6bd7a080 a2=0 a3=7ffe6bd7a06c items=0 ppid=2280 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:42:12.713000 audit[2428]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:42:12.713000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd16f0bf10 a2=0 a3=7ffd16f0befc items=0 ppid=2280 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.713000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:12.713000 audit[2428]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:42:12.713000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd16f0bf10 a2=0 a3=7ffd16f0befc items=0 ppid=2280 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.713000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:12.763191 env[1255]: time="2025-05-17T00:42:12.763150505Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:12.763900 env[1255]: time="2025-05-17T00:42:12.763884310Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:12.764545 env[1255]: time="2025-05-17T00:42:12.764531009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:12.765327 env[1255]: time="2025-05-17T00:42:12.765313286Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:12.765740 env[1255]: time="2025-05-17T00:42:12.765723873Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:42:12.767668 env[1255]: time="2025-05-17T00:42:12.767625471Z" level=info msg="CreateContainer within sandbox \"e8690f8a60da47f4ce49b241ee2517852a3c4dd1d3972cff475782094e5def3c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:42:12.773361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3676027572.mount: Deactivated successfully. May 17 00:42:12.776330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1066301686.mount: Deactivated successfully. May 17 00:42:12.783241 env[1255]: time="2025-05-17T00:42:12.783222225Z" level=info msg="CreateContainer within sandbox \"e8690f8a60da47f4ce49b241ee2517852a3c4dd1d3972cff475782094e5def3c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"eece112fa340acd4dc6c2d03936a803522536f1524f689d021152fba00fdfd7a\"" May 17 00:42:12.783614 env[1255]: time="2025-05-17T00:42:12.783582350Z" level=info msg="StartContainer for \"eece112fa340acd4dc6c2d03936a803522536f1524f689d021152fba00fdfd7a\"" May 17 00:42:12.796679 systemd[1]: Started cri-containerd-eece112fa340acd4dc6c2d03936a803522536f1524f689d021152fba00fdfd7a.scope. May 17 00:42:12.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit: BPF prog-id=111 op=LOAD May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2182 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636531313266613334306163643464633663326430333933366138 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2182 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636531313266613334306163643464633663326430333933366138 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit: BPF prog-id=112 op=LOAD May 17 00:42:12.806000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b6c10 items=0 ppid=2182 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636531313266613334306163643464633663326430333933366138 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit: BPF prog-id=113 op=LOAD May 17 00:42:12.806000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b6c58 items=0 ppid=2182 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636531313266613334306163643464633663326430333933366138 May 17 00:42:12.806000 audit: BPF prog-id=113 op=UNLOAD May 17 00:42:12.806000 audit: BPF prog-id=112 op=UNLOAD May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:12.806000 audit: BPF prog-id=114 op=LOAD May 17 00:42:12.806000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b7068 items=0 ppid=2182 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:12.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636531313266613334306163643464633663326430333933366138 May 17 00:42:12.821767 env[1255]: time="2025-05-17T00:42:12.821746389Z" level=info msg="StartContainer for \"eece112fa340acd4dc6c2d03936a803522536f1524f689d021152fba00fdfd7a\" returns successfully" May 17 00:42:13.337051 kubelet[2126]: I0517 00:42:13.337008 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-cdx7b" podStartSLOduration=1.6493927670000001 podStartE2EDuration="4.336997375s" podCreationTimestamp="2025-05-17 00:42:09 +0000 UTC" firstStartedPulling="2025-05-17 00:42:10.078896595 +0000 UTC m=+5.094477798" lastFinishedPulling="2025-05-17 00:42:12.766501207 +0000 UTC m=+7.782082406" observedRunningTime="2025-05-17 00:42:13.336734056 +0000 UTC m=+8.352315260" watchObservedRunningTime="2025-05-17 00:42:13.336997375 +0000 UTC m=+8.352578587" May 17 00:42:17.877000 audit[1492]: USER_END pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:17.883360 kernel: kauditd_printk_skb: 357 callbacks suppressed May 17 00:42:17.883417 kernel: audit: type=1106 audit(1747442537.877:861): pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:17.883440 kernel: audit: type=1104 audit(1747442537.877:862): pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:17.877000 audit[1492]: CRED_DISP pid=1492 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:42:17.879271 sudo[1492]: pam_unix(sudo:session): session closed for user root May 17 00:42:17.893126 sshd[1488]: pam_unix(sshd:session): session closed for user core May 17 00:42:17.895000 audit[1488]: USER_END pid=1488 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:17.900665 kernel: audit: type=1106 audit(1747442537.895:863): pid=1488 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:17.895000 audit[1488]: CRED_DISP pid=1488 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:17.904392 kernel: audit: type=1104 audit(1747442537.895:864): pid=1488 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:42:17.910698 systemd[1]: sshd@6-139.178.70.109:22-147.75.109.163:54428.service: Deactivated successfully. May 17 00:42:17.911239 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:42:17.911347 systemd[1]: session-9.scope: Consumed 3.547s CPU time. May 17 00:42:17.911896 systemd-logind[1246]: Session 9 logged out. Waiting for processes to exit. May 17 00:42:17.914638 systemd-logind[1246]: Removed session 9. May 17 00:42:17.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-147.75.109.163:54428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:17.918395 kernel: audit: type=1131 audit(1747442537.909:865): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-147.75.109.163:54428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:18.460000 audit[2508]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:18.460000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc8a02d2b0 a2=0 a3=7ffc8a02d29c items=0 ppid=2280 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:18.468793 kernel: audit: type=1325 audit(1747442538.460:866): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:18.468889 kernel: audit: type=1300 audit(1747442538.460:866): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc8a02d2b0 a2=0 a3=7ffc8a02d29c items=0 ppid=2280 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:18.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:18.472404 kernel: audit: type=1327 audit(1747442538.460:866): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:18.471000 audit[2508]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:18.471000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc8a02d2b0 a2=0 a3=0 items=0 ppid=2280 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:18.479698 kernel: audit: type=1325 audit(1747442538.471:867): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:18.479796 kernel: audit: type=1300 audit(1747442538.471:867): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc8a02d2b0 a2=0 a3=0 items=0 ppid=2280 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:18.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:18.486000 audit[2510]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:18.486000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff2dca7ce0 a2=0 a3=7fff2dca7ccc items=0 ppid=2280 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:18.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:18.489000 audit[2510]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:18.489000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff2dca7ce0 a2=0 a3=0 items=0 ppid=2280 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:18.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:19.909000 audit[2512]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:19.909000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdbea1e640 a2=0 a3=7ffdbea1e62c items=0 ppid=2280 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:19.914000 audit[2512]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:19.914000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdbea1e640 a2=0 a3=0 items=0 ppid=2280 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:19.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:20.374130 systemd[1]: Created slice kubepods-besteffort-pode9d03c1b_bff6_46cf_b83a_ba14ce6af810.slice. May 17 00:42:20.394310 kubelet[2126]: I0517 00:42:20.394286 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-22dnh\" (UniqueName: \"kubernetes.io/projected/e9d03c1b-bff6-46cf-b83a-ba14ce6af810-kube-api-access-22dnh\") pod \"calico-typha-f6fcc847b-9pmc8\" (UID: \"e9d03c1b-bff6-46cf-b83a-ba14ce6af810\") " pod="calico-system/calico-typha-f6fcc847b-9pmc8" May 17 00:42:20.394535 kubelet[2126]: I0517 00:42:20.394320 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e9d03c1b-bff6-46cf-b83a-ba14ce6af810-tigera-ca-bundle\") pod \"calico-typha-f6fcc847b-9pmc8\" (UID: \"e9d03c1b-bff6-46cf-b83a-ba14ce6af810\") " pod="calico-system/calico-typha-f6fcc847b-9pmc8" May 17 00:42:20.394535 kubelet[2126]: I0517 00:42:20.394337 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e9d03c1b-bff6-46cf-b83a-ba14ce6af810-typha-certs\") pod \"calico-typha-f6fcc847b-9pmc8\" (UID: \"e9d03c1b-bff6-46cf-b83a-ba14ce6af810\") " pod="calico-system/calico-typha-f6fcc847b-9pmc8" May 17 00:42:20.427000 audit[2514]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:20.427000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffce11a57b0 a2=0 a3=7ffce11a579c items=0 ppid=2280 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:20.429000 audit[2514]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:20.429000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffce11a57b0 a2=0 a3=0 items=0 ppid=2280 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:20.701956 env[1255]: time="2025-05-17T00:42:20.701875170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-f6fcc847b-9pmc8,Uid:e9d03c1b-bff6-46cf-b83a-ba14ce6af810,Namespace:calico-system,Attempt:0,}" May 17 00:42:20.713859 env[1255]: time="2025-05-17T00:42:20.713810743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:20.713956 env[1255]: time="2025-05-17T00:42:20.713863234Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:20.713956 env[1255]: time="2025-05-17T00:42:20.713883369Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:20.714025 env[1255]: time="2025-05-17T00:42:20.713999279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4173e5ba5941d7cc7383c85df4997c7a9653cf6b1ffd5dd588b85b8fd4c78583 pid=2523 runtime=io.containerd.runc.v2 May 17 00:42:20.730523 systemd[1]: Started cri-containerd-4173e5ba5941d7cc7383c85df4997c7a9653cf6b1ffd5dd588b85b8fd4c78583.scope. May 17 00:42:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.742000 audit: BPF prog-id=115 op=LOAD May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373365356261353934316437636337333833633835646634393937 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373365356261353934316437636337333833633835646634393937 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit: BPF prog-id=116 op=LOAD May 17 00:42:20.743000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000292a10 items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373365356261353934316437636337333833633835646634393937 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.743000 audit: BPF prog-id=117 op=LOAD May 17 00:42:20.743000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000292a58 items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373365356261353934316437636337333833633835646634393937 May 17 00:42:20.744000 audit: BPF prog-id=117 op=UNLOAD May 17 00:42:20.744000 audit: BPF prog-id=116 op=UNLOAD May 17 00:42:20.744000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:20.744000 audit: BPF prog-id=118 op=LOAD May 17 00:42:20.744000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000292e68 items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:20.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431373365356261353934316437636337333833633835646634393937 May 17 00:42:20.775696 env[1255]: time="2025-05-17T00:42:20.775672568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-f6fcc847b-9pmc8,Uid:e9d03c1b-bff6-46cf-b83a-ba14ce6af810,Namespace:calico-system,Attempt:0,} returns sandbox id \"4173e5ba5941d7cc7383c85df4997c7a9653cf6b1ffd5dd588b85b8fd4c78583\"" May 17 00:42:20.789034 systemd[1]: Created slice kubepods-besteffort-podab077caa_a312_4b50_bce6_dad3b38cd679.slice. May 17 00:42:20.798635 env[1255]: time="2025-05-17T00:42:20.798592874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:42:20.903173 kubelet[2126]: I0517 00:42:20.903143 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-xtables-lock\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903319 kubelet[2126]: I0517 00:42:20.903309 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ab077caa-a312-4b50-bce6-dad3b38cd679-node-certs\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903397 kubelet[2126]: I0517 00:42:20.903370 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-var-run-calico\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903455 kubelet[2126]: I0517 00:42:20.903446 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-lib-modules\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903547 kubelet[2126]: I0517 00:42:20.903538 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab077caa-a312-4b50-bce6-dad3b38cd679-tigera-ca-bundle\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903630 kubelet[2126]: I0517 00:42:20.903618 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z2n4z\" (UniqueName: \"kubernetes.io/projected/ab077caa-a312-4b50-bce6-dad3b38cd679-kube-api-access-z2n4z\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903705 kubelet[2126]: I0517 00:42:20.903696 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-cni-bin-dir\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903780 kubelet[2126]: I0517 00:42:20.903772 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-flexvol-driver-host\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903849 kubelet[2126]: I0517 00:42:20.903841 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-cni-log-dir\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.903934 kubelet[2126]: I0517 00:42:20.903926 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-policysync\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.904005 kubelet[2126]: I0517 00:42:20.903997 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-cni-net-dir\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.904066 kubelet[2126]: I0517 00:42:20.904058 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ab077caa-a312-4b50-bce6-dad3b38cd679-var-lib-calico\") pod \"calico-node-4www2\" (UID: \"ab077caa-a312-4b50-bce6-dad3b38cd679\") " pod="calico-system/calico-node-4www2" May 17 00:42:20.982244 kubelet[2126]: E0517 00:42:20.982181 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:21.006503 kubelet[2126]: E0517 00:42:21.006485 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.006635 kubelet[2126]: W0517 00:42:21.006623 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.008965 kubelet[2126]: E0517 00:42:21.008948 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.009250 kubelet[2126]: E0517 00:42:21.009241 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.009314 kubelet[2126]: W0517 00:42:21.009303 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.009393 kubelet[2126]: E0517 00:42:21.009365 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.009752 kubelet[2126]: E0517 00:42:21.009742 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.009833 kubelet[2126]: W0517 00:42:21.009825 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.009880 kubelet[2126]: E0517 00:42:21.009872 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.010046 kubelet[2126]: E0517 00:42:21.010039 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.010101 kubelet[2126]: W0517 00:42:21.010085 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.010150 kubelet[2126]: E0517 00:42:21.010142 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.010490 kubelet[2126]: E0517 00:42:21.010483 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.010550 kubelet[2126]: W0517 00:42:21.010542 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.010604 kubelet[2126]: E0517 00:42:21.010596 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.011967 kubelet[2126]: E0517 00:42:21.011960 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.012032 kubelet[2126]: W0517 00:42:21.012023 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.012087 kubelet[2126]: E0517 00:42:21.012078 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.012244 kubelet[2126]: E0517 00:42:21.012238 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.012298 kubelet[2126]: W0517 00:42:21.012290 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.012344 kubelet[2126]: E0517 00:42:21.012337 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.012514 kubelet[2126]: E0517 00:42:21.012508 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.012556 kubelet[2126]: W0517 00:42:21.012548 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.012621 kubelet[2126]: E0517 00:42:21.012613 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.012781 kubelet[2126]: E0517 00:42:21.012775 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.012829 kubelet[2126]: W0517 00:42:21.012820 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.012880 kubelet[2126]: E0517 00:42:21.012872 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.015576 kubelet[2126]: E0517 00:42:21.015568 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.015631 kubelet[2126]: W0517 00:42:21.015622 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.015688 kubelet[2126]: E0517 00:42:21.015679 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.083062 kubelet[2126]: E0517 00:42:21.083044 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.083172 kubelet[2126]: W0517 00:42:21.083160 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.083228 kubelet[2126]: E0517 00:42:21.083219 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.083364 kubelet[2126]: E0517 00:42:21.083358 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.083425 kubelet[2126]: W0517 00:42:21.083417 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.083493 kubelet[2126]: E0517 00:42:21.083485 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.083613 kubelet[2126]: E0517 00:42:21.083608 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.083657 kubelet[2126]: W0517 00:42:21.083649 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.083704 kubelet[2126]: E0517 00:42:21.083696 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.083849 kubelet[2126]: E0517 00:42:21.083844 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.083894 kubelet[2126]: W0517 00:42:21.083885 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.083941 kubelet[2126]: E0517 00:42:21.083934 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.084068 kubelet[2126]: E0517 00:42:21.084062 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.084117 kubelet[2126]: W0517 00:42:21.084109 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.084162 kubelet[2126]: E0517 00:42:21.084154 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.084280 kubelet[2126]: E0517 00:42:21.084274 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.084323 kubelet[2126]: W0517 00:42:21.084315 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.084370 kubelet[2126]: E0517 00:42:21.084362 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.084503 kubelet[2126]: E0517 00:42:21.084497 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.084546 kubelet[2126]: W0517 00:42:21.084538 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.084591 kubelet[2126]: E0517 00:42:21.084584 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.084708 kubelet[2126]: E0517 00:42:21.084702 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.084752 kubelet[2126]: W0517 00:42:21.084743 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.084798 kubelet[2126]: E0517 00:42:21.084790 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.084915 kubelet[2126]: E0517 00:42:21.084909 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.084958 kubelet[2126]: W0517 00:42:21.084950 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.085006 kubelet[2126]: E0517 00:42:21.084998 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.085138 kubelet[2126]: E0517 00:42:21.085132 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.085216 kubelet[2126]: W0517 00:42:21.085207 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.085263 kubelet[2126]: E0517 00:42:21.085255 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.085417 kubelet[2126]: E0517 00:42:21.085411 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.085469 kubelet[2126]: W0517 00:42:21.085456 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.085531 kubelet[2126]: E0517 00:42:21.085523 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.085649 kubelet[2126]: E0517 00:42:21.085644 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.085704 kubelet[2126]: W0517 00:42:21.085692 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.085795 kubelet[2126]: E0517 00:42:21.085786 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.085934 kubelet[2126]: E0517 00:42:21.085928 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.085979 kubelet[2126]: W0517 00:42:21.085971 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.086025 kubelet[2126]: E0517 00:42:21.086017 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.086286 kubelet[2126]: E0517 00:42:21.086278 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.086340 kubelet[2126]: W0517 00:42:21.086332 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.086402 kubelet[2126]: E0517 00:42:21.086393 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.086540 kubelet[2126]: E0517 00:42:21.086534 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.086586 kubelet[2126]: W0517 00:42:21.086578 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.086632 kubelet[2126]: E0517 00:42:21.086624 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.086754 kubelet[2126]: E0517 00:42:21.086749 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.086796 kubelet[2126]: W0517 00:42:21.086789 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.086843 kubelet[2126]: E0517 00:42:21.086835 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.086967 kubelet[2126]: E0517 00:42:21.086961 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.087012 kubelet[2126]: W0517 00:42:21.087004 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.087057 kubelet[2126]: E0517 00:42:21.087050 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.087179 kubelet[2126]: E0517 00:42:21.087174 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.087224 kubelet[2126]: W0517 00:42:21.087216 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.087271 kubelet[2126]: E0517 00:42:21.087263 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.087404 kubelet[2126]: E0517 00:42:21.087399 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.087450 kubelet[2126]: W0517 00:42:21.087442 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.087494 kubelet[2126]: E0517 00:42:21.087487 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.087618 kubelet[2126]: E0517 00:42:21.087612 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.087662 kubelet[2126]: W0517 00:42:21.087655 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.087704 kubelet[2126]: E0517 00:42:21.087697 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.092058 env[1255]: time="2025-05-17T00:42:21.092030055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4www2,Uid:ab077caa-a312-4b50-bce6-dad3b38cd679,Namespace:calico-system,Attempt:0,}" May 17 00:42:21.106235 kubelet[2126]: E0517 00:42:21.106220 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.106408 kubelet[2126]: W0517 00:42:21.106372 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.106659 env[1255]: time="2025-05-17T00:42:21.106602448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:21.106659 env[1255]: time="2025-05-17T00:42:21.106640807Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:21.106771 env[1255]: time="2025-05-17T00:42:21.106743639Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:21.106988 kubelet[2126]: E0517 00:42:21.106974 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.107070 kubelet[2126]: I0517 00:42:21.107058 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d90242e4-0770-4c57-b411-99b69c529708-registration-dir\") pod \"csi-node-driver-mckdw\" (UID: \"d90242e4-0770-4c57-b411-99b69c529708\") " pod="calico-system/csi-node-driver-mckdw" May 17 00:42:21.107294 kubelet[2126]: E0517 00:42:21.107285 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.107351 kubelet[2126]: W0517 00:42:21.107342 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.107439 env[1255]: time="2025-05-17T00:42:21.106933364Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153 pid=2598 runtime=io.containerd.runc.v2 May 17 00:42:21.107486 kubelet[2126]: E0517 00:42:21.107425 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.107659 kubelet[2126]: E0517 00:42:21.107650 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.107727 kubelet[2126]: W0517 00:42:21.107718 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.107786 kubelet[2126]: E0517 00:42:21.107777 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.108634 kubelet[2126]: E0517 00:42:21.108624 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.108718 kubelet[2126]: W0517 00:42:21.108708 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.108783 kubelet[2126]: E0517 00:42:21.108773 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.108853 kubelet[2126]: I0517 00:42:21.108843 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d90242e4-0770-4c57-b411-99b69c529708-varrun\") pod \"csi-node-driver-mckdw\" (UID: \"d90242e4-0770-4c57-b411-99b69c529708\") " pod="calico-system/csi-node-driver-mckdw" May 17 00:42:21.109071 kubelet[2126]: E0517 00:42:21.109062 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.109137 kubelet[2126]: W0517 00:42:21.109127 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.109199 kubelet[2126]: E0517 00:42:21.109189 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.109385 kubelet[2126]: E0517 00:42:21.109369 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.109452 kubelet[2126]: W0517 00:42:21.109443 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.109507 kubelet[2126]: E0517 00:42:21.109499 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.109679 kubelet[2126]: E0517 00:42:21.109672 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.109747 kubelet[2126]: W0517 00:42:21.109738 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.109810 kubelet[2126]: E0517 00:42:21.109800 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.109921 kubelet[2126]: I0517 00:42:21.109910 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d90242e4-0770-4c57-b411-99b69c529708-socket-dir\") pod \"csi-node-driver-mckdw\" (UID: \"d90242e4-0770-4c57-b411-99b69c529708\") " pod="calico-system/csi-node-driver-mckdw" May 17 00:42:21.110129 kubelet[2126]: E0517 00:42:21.110121 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.110237 kubelet[2126]: W0517 00:42:21.110226 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.110314 kubelet[2126]: E0517 00:42:21.110302 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.110503 kubelet[2126]: E0517 00:42:21.110495 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.110565 kubelet[2126]: W0517 00:42:21.110555 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.110628 kubelet[2126]: E0517 00:42:21.110617 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.110803 kubelet[2126]: E0517 00:42:21.110796 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.110867 kubelet[2126]: W0517 00:42:21.110857 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.111253 kubelet[2126]: E0517 00:42:21.110950 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.111253 kubelet[2126]: I0517 00:42:21.110968 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9wkk\" (UniqueName: \"kubernetes.io/projected/d90242e4-0770-4c57-b411-99b69c529708-kube-api-access-v9wkk\") pod \"csi-node-driver-mckdw\" (UID: \"d90242e4-0770-4c57-b411-99b69c529708\") " pod="calico-system/csi-node-driver-mckdw" May 17 00:42:21.111253 kubelet[2126]: E0517 00:42:21.111133 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.111253 kubelet[2126]: W0517 00:42:21.111141 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.111253 kubelet[2126]: E0517 00:42:21.111149 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.111253 kubelet[2126]: I0517 00:42:21.111167 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d90242e4-0770-4c57-b411-99b69c529708-kubelet-dir\") pod \"csi-node-driver-mckdw\" (UID: \"d90242e4-0770-4c57-b411-99b69c529708\") " pod="calico-system/csi-node-driver-mckdw" May 17 00:42:21.111564 kubelet[2126]: E0517 00:42:21.111556 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.111637 kubelet[2126]: W0517 00:42:21.111627 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.111702 kubelet[2126]: E0517 00:42:21.111692 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.111859 kubelet[2126]: E0517 00:42:21.111850 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.111925 kubelet[2126]: W0517 00:42:21.111916 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.111988 kubelet[2126]: E0517 00:42:21.111977 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.112162 kubelet[2126]: E0517 00:42:21.112154 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.112221 kubelet[2126]: W0517 00:42:21.112213 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.112296 kubelet[2126]: E0517 00:42:21.112286 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.112481 kubelet[2126]: E0517 00:42:21.112474 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.112610 kubelet[2126]: W0517 00:42:21.112601 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.112689 kubelet[2126]: E0517 00:42:21.112678 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.115704 systemd[1]: Started cri-containerd-ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153.scope. May 17 00:42:21.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.129000 audit: BPF prog-id=119 op=LOAD May 17 00:42:21.130000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2598 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303038666565356330363538633161303166356134373638646564 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2598 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303038666565356330363538633161303166356134373638646564 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.130000 audit: BPF prog-id=120 op=LOAD May 17 00:42:21.130000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00030af90 items=0 ppid=2598 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303038666565356330363538633161303166356134373638646564 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.131000 audit: BPF prog-id=121 op=LOAD May 17 00:42:21.131000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00030afd8 items=0 ppid=2598 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303038666565356330363538633161303166356134373638646564 May 17 00:42:21.132000 audit: BPF prog-id=121 op=UNLOAD May 17 00:42:21.132000 audit: BPF prog-id=120 op=UNLOAD May 17 00:42:21.132000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:21.132000 audit: BPF prog-id=122 op=LOAD May 17 00:42:21.132000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00030b3e8 items=0 ppid=2598 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303038666565356330363538633161303166356134373638646564 May 17 00:42:21.143201 env[1255]: time="2025-05-17T00:42:21.143163896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4www2,Uid:ab077caa-a312-4b50-bce6-dad3b38cd679,Namespace:calico-system,Attempt:0,} returns sandbox id \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\"" May 17 00:42:21.212013 kubelet[2126]: E0517 00:42:21.211987 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212013 kubelet[2126]: W0517 00:42:21.212006 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.212159 kubelet[2126]: E0517 00:42:21.212021 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.212191 kubelet[2126]: E0517 00:42:21.212174 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212191 kubelet[2126]: W0517 00:42:21.212180 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.212191 kubelet[2126]: E0517 00:42:21.212187 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.212312 kubelet[2126]: E0517 00:42:21.212300 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212351 kubelet[2126]: W0517 00:42:21.212317 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.212351 kubelet[2126]: E0517 00:42:21.212326 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.212491 kubelet[2126]: E0517 00:42:21.212476 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212491 kubelet[2126]: W0517 00:42:21.212487 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.212556 kubelet[2126]: E0517 00:42:21.212494 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.212650 kubelet[2126]: E0517 00:42:21.212636 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212650 kubelet[2126]: W0517 00:42:21.212647 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.212709 kubelet[2126]: E0517 00:42:21.212654 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.212803 kubelet[2126]: E0517 00:42:21.212790 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212841 kubelet[2126]: W0517 00:42:21.212801 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.212841 kubelet[2126]: E0517 00:42:21.212817 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.212966 kubelet[2126]: E0517 00:42:21.212945 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.212966 kubelet[2126]: W0517 00:42:21.212961 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.213034 kubelet[2126]: E0517 00:42:21.212969 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.213080 kubelet[2126]: E0517 00:42:21.213064 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.213080 kubelet[2126]: W0517 00:42:21.213073 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.213150 kubelet[2126]: E0517 00:42:21.213085 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.213236 kubelet[2126]: E0517 00:42:21.213221 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.213236 kubelet[2126]: W0517 00:42:21.213231 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.213304 kubelet[2126]: E0517 00:42:21.213237 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.213536 kubelet[2126]: E0517 00:42:21.213522 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.213536 kubelet[2126]: W0517 00:42:21.213531 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.213625 kubelet[2126]: E0517 00:42:21.213544 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.213653 kubelet[2126]: E0517 00:42:21.213644 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.213653 kubelet[2126]: W0517 00:42:21.213649 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.213655 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.213754 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.215439 kubelet[2126]: W0517 00:42:21.213760 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.213766 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.214429 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.215439 kubelet[2126]: W0517 00:42:21.214441 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.214451 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.214595 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.215439 kubelet[2126]: W0517 00:42:21.214602 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215439 kubelet[2126]: E0517 00:42:21.214609 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.215682 kubelet[2126]: E0517 00:42:21.214734 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.215682 kubelet[2126]: W0517 00:42:21.214740 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215682 kubelet[2126]: E0517 00:42:21.214747 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.215682 kubelet[2126]: E0517 00:42:21.215053 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.215682 kubelet[2126]: W0517 00:42:21.215061 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215682 kubelet[2126]: E0517 00:42:21.215068 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.215682 kubelet[2126]: E0517 00:42:21.215267 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.215682 kubelet[2126]: W0517 00:42:21.215279 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.215682 kubelet[2126]: E0517 00:42:21.215287 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.218462 kubelet[2126]: E0517 00:42:21.218446 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.218462 kubelet[2126]: W0517 00:42:21.218457 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.218562 kubelet[2126]: E0517 00:42:21.218467 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.218648 kubelet[2126]: E0517 00:42:21.218635 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.218648 kubelet[2126]: W0517 00:42:21.218645 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.218724 kubelet[2126]: E0517 00:42:21.218653 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.218973 kubelet[2126]: E0517 00:42:21.218961 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.218973 kubelet[2126]: W0517 00:42:21.218971 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.219049 kubelet[2126]: E0517 00:42:21.218979 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.219129 kubelet[2126]: E0517 00:42:21.219115 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.219129 kubelet[2126]: W0517 00:42:21.219124 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.219208 kubelet[2126]: E0517 00:42:21.219132 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.219324 kubelet[2126]: E0517 00:42:21.219312 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.219324 kubelet[2126]: W0517 00:42:21.219323 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.219415 kubelet[2126]: E0517 00:42:21.219330 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.219474 kubelet[2126]: E0517 00:42:21.219461 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.219474 kubelet[2126]: W0517 00:42:21.219473 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.219554 kubelet[2126]: E0517 00:42:21.219482 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.219696 kubelet[2126]: E0517 00:42:21.219677 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.219696 kubelet[2126]: W0517 00:42:21.219687 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.219696 kubelet[2126]: E0517 00:42:21.219694 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.220290 kubelet[2126]: E0517 00:42:21.220276 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.220290 kubelet[2126]: W0517 00:42:21.220286 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.220384 kubelet[2126]: E0517 00:42:21.220294 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.224823 kubelet[2126]: E0517 00:42:21.224800 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:21.224823 kubelet[2126]: W0517 00:42:21.224813 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:21.224823 kubelet[2126]: E0517 00:42:21.224829 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:21.501397 systemd[1]: run-containerd-runc-k8s.io-4173e5ba5941d7cc7383c85df4997c7a9653cf6b1ffd5dd588b85b8fd4c78583-runc.b39XK8.mount: Deactivated successfully. May 17 00:42:22.269027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2626673815.mount: Deactivated successfully. May 17 00:42:22.336494 kubelet[2126]: E0517 00:42:22.336448 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:22.984370 env[1255]: time="2025-05-17T00:42:22.984335694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:22.999210 env[1255]: time="2025-05-17T00:42:22.999183870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:23.006331 env[1255]: time="2025-05-17T00:42:23.006308075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:23.013067 env[1255]: time="2025-05-17T00:42:23.013042026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:23.013487 env[1255]: time="2025-05-17T00:42:23.013456277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:42:23.014432 env[1255]: time="2025-05-17T00:42:23.014415708Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:42:23.032008 env[1255]: time="2025-05-17T00:42:23.031977912Z" level=info msg="CreateContainer within sandbox \"4173e5ba5941d7cc7383c85df4997c7a9653cf6b1ffd5dd588b85b8fd4c78583\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:42:23.039198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1930902259.mount: Deactivated successfully. May 17 00:42:23.054595 env[1255]: time="2025-05-17T00:42:23.054564752Z" level=info msg="CreateContainer within sandbox \"4173e5ba5941d7cc7383c85df4997c7a9653cf6b1ffd5dd588b85b8fd4c78583\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6bcbb18dea96df515300201962ab3bb075e3f49722b188ca37f8d959052662d8\"" May 17 00:42:23.056399 env[1255]: time="2025-05-17T00:42:23.056359736Z" level=info msg="StartContainer for \"6bcbb18dea96df515300201962ab3bb075e3f49722b188ca37f8d959052662d8\"" May 17 00:42:23.075333 systemd[1]: Started cri-containerd-6bcbb18dea96df515300201962ab3bb075e3f49722b188ca37f8d959052662d8.scope. May 17 00:42:23.093526 kernel: kauditd_printk_skb: 133 callbacks suppressed May 17 00:42:23.093639 kernel: audit: type=1400 audit(1747442543.090:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099079 kernel: audit: type=1400 audit(1747442543.090:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099114 kernel: audit: type=1400 audit(1747442543.090:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.106259 kernel: audit: type=1400 audit(1747442543.090:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.106290 kernel: audit: type=1400 audit(1747442543.090:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.106311 kernel: audit: type=1400 audit(1747442543.091:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.111126 kernel: audit: type=1400 audit(1747442543.091:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.111170 kernel: audit: type=1400 audit(1747442543.091:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.115993 kernel: audit: type=1400 audit(1747442543.091:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.091000 audit: BPF prog-id=123 op=LOAD May 17 00:42:23.098000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.157844 kernel: audit: type=1400 audit(1747442543.091:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.098000 audit[2684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2523 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:23.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636262313864656139366466353135333030323031393632616233 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2523 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:23.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636262313864656139366466353135333030323031393632616233 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit: BPF prog-id=124 op=LOAD May 17 00:42:23.099000 audit[2684]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00037b120 items=0 ppid=2523 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:23.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636262313864656139366466353135333030323031393632616233 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit: BPF prog-id=125 op=LOAD May 17 00:42:23.099000 audit[2684]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00037b168 items=0 ppid=2523 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:23.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636262313864656139366466353135333030323031393632616233 May 17 00:42:23.099000 audit: BPF prog-id=125 op=UNLOAD May 17 00:42:23.099000 audit: BPF prog-id=124 op=UNLOAD May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { perfmon } for pid=2684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit[2684]: AVC avc: denied { bpf } for pid=2684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:23.099000 audit: BPF prog-id=126 op=LOAD May 17 00:42:23.099000 audit[2684]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00037b578 items=0 ppid=2523 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:23.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636262313864656139366466353135333030323031393632616233 May 17 00:42:23.170166 env[1255]: time="2025-05-17T00:42:23.170133786Z" level=info msg="StartContainer for \"6bcbb18dea96df515300201962ab3bb075e3f49722b188ca37f8d959052662d8\" returns successfully" May 17 00:42:23.404487 kubelet[2126]: E0517 00:42:23.404466 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.404487 kubelet[2126]: W0517 00:42:23.404482 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.404750 kubelet[2126]: E0517 00:42:23.404498 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.405271 kubelet[2126]: E0517 00:42:23.405259 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.405304 kubelet[2126]: W0517 00:42:23.405271 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.405304 kubelet[2126]: E0517 00:42:23.405280 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.405386 kubelet[2126]: E0517 00:42:23.405374 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.405386 kubelet[2126]: W0517 00:42:23.405385 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.405431 kubelet[2126]: E0517 00:42:23.405391 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.405484 kubelet[2126]: E0517 00:42:23.405472 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.405484 kubelet[2126]: W0517 00:42:23.405482 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.405548 kubelet[2126]: E0517 00:42:23.405490 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.405689 kubelet[2126]: E0517 00:42:23.405672 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.405689 kubelet[2126]: W0517 00:42:23.405680 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.405689 kubelet[2126]: E0517 00:42:23.405686 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.405780 kubelet[2126]: E0517 00:42:23.405770 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.405780 kubelet[2126]: W0517 00:42:23.405778 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.405784 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.405865 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408244 kubelet[2126]: W0517 00:42:23.405870 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.405875 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.405953 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408244 kubelet[2126]: W0517 00:42:23.405957 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.405962 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.406046 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408244 kubelet[2126]: W0517 00:42:23.406050 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408244 kubelet[2126]: E0517 00:42:23.406054 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408477 kubelet[2126]: E0517 00:42:23.406150 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408477 kubelet[2126]: W0517 00:42:23.406155 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408477 kubelet[2126]: E0517 00:42:23.406162 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408477 kubelet[2126]: E0517 00:42:23.408406 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408477 kubelet[2126]: W0517 00:42:23.408414 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408477 kubelet[2126]: E0517 00:42:23.408423 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408585 kubelet[2126]: E0517 00:42:23.408537 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408585 kubelet[2126]: W0517 00:42:23.408542 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408585 kubelet[2126]: E0517 00:42:23.408549 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408730 kubelet[2126]: E0517 00:42:23.408719 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408768 kubelet[2126]: W0517 00:42:23.408730 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408768 kubelet[2126]: E0517 00:42:23.408740 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.408844 kubelet[2126]: E0517 00:42:23.408836 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.408844 kubelet[2126]: W0517 00:42:23.408842 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.408912 kubelet[2126]: E0517 00:42:23.408848 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.409023 kubelet[2126]: E0517 00:42:23.409012 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.409054 kubelet[2126]: W0517 00:42:23.409024 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.409054 kubelet[2126]: E0517 00:42:23.409033 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.427089 kubelet[2126]: E0517 00:42:23.427063 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.427089 kubelet[2126]: W0517 00:42:23.427080 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.427227 kubelet[2126]: E0517 00:42:23.427097 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.430108 kubelet[2126]: E0517 00:42:23.430090 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.430108 kubelet[2126]: W0517 00:42:23.430104 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.430218 kubelet[2126]: E0517 00:42:23.430117 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.430284 kubelet[2126]: E0517 00:42:23.430274 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.430284 kubelet[2126]: W0517 00:42:23.430283 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430291 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430440 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.433637 kubelet[2126]: W0517 00:42:23.430452 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430460 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430603 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.433637 kubelet[2126]: W0517 00:42:23.430610 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430625 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430748 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.433637 kubelet[2126]: W0517 00:42:23.430759 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.433637 kubelet[2126]: E0517 00:42:23.430766 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.430908 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434167 kubelet[2126]: W0517 00:42:23.430916 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.430923 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.431154 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434167 kubelet[2126]: W0517 00:42:23.431160 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.431168 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.431293 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434167 kubelet[2126]: W0517 00:42:23.431302 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.431310 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434167 kubelet[2126]: E0517 00:42:23.431465 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434483 kubelet[2126]: W0517 00:42:23.431473 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434483 kubelet[2126]: E0517 00:42:23.431480 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434483 kubelet[2126]: E0517 00:42:23.431600 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434483 kubelet[2126]: W0517 00:42:23.431605 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434483 kubelet[2126]: E0517 00:42:23.431618 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434483 kubelet[2126]: E0517 00:42:23.431743 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434483 kubelet[2126]: W0517 00:42:23.431750 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434483 kubelet[2126]: E0517 00:42:23.431757 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434483 kubelet[2126]: E0517 00:42:23.431902 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434483 kubelet[2126]: W0517 00:42:23.431909 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.431916 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.432101 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434789 kubelet[2126]: W0517 00:42:23.432108 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.432118 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.432233 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434789 kubelet[2126]: W0517 00:42:23.432240 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.432247 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.432372 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434789 kubelet[2126]: W0517 00:42:23.432385 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434789 kubelet[2126]: E0517 00:42:23.432397 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434995 kubelet[2126]: E0517 00:42:23.432579 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434995 kubelet[2126]: W0517 00:42:23.432585 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434995 kubelet[2126]: E0517 00:42:23.432591 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:23.434995 kubelet[2126]: E0517 00:42:23.433065 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:23.434995 kubelet[2126]: W0517 00:42:23.433071 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:23.434995 kubelet[2126]: E0517 00:42:23.433078 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.311421 kubelet[2126]: E0517 00:42:24.311353 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:24.365343 kubelet[2126]: I0517 00:42:24.365325 2126 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:24.416116 kubelet[2126]: E0517 00:42:24.416099 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.416348 kubelet[2126]: W0517 00:42:24.416336 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.416415 kubelet[2126]: E0517 00:42:24.416404 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.416567 kubelet[2126]: E0517 00:42:24.416560 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.416616 kubelet[2126]: W0517 00:42:24.416608 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.416663 kubelet[2126]: E0517 00:42:24.416655 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.416798 kubelet[2126]: E0517 00:42:24.416792 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.416844 kubelet[2126]: W0517 00:42:24.416836 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.416890 kubelet[2126]: E0517 00:42:24.416881 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.417068 kubelet[2126]: E0517 00:42:24.417062 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.417116 kubelet[2126]: W0517 00:42:24.417107 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.417163 kubelet[2126]: E0517 00:42:24.417155 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.417298 kubelet[2126]: E0517 00:42:24.417292 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.417347 kubelet[2126]: W0517 00:42:24.417339 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.417401 kubelet[2126]: E0517 00:42:24.417393 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.417528 kubelet[2126]: E0517 00:42:24.417522 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.417574 kubelet[2126]: W0517 00:42:24.417566 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.417620 kubelet[2126]: E0517 00:42:24.417613 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.417740 kubelet[2126]: E0517 00:42:24.417734 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.417788 kubelet[2126]: W0517 00:42:24.417780 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.417835 kubelet[2126]: E0517 00:42:24.417827 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.417957 kubelet[2126]: E0517 00:42:24.417951 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.418003 kubelet[2126]: W0517 00:42:24.417995 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.418051 kubelet[2126]: E0517 00:42:24.418044 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.418180 kubelet[2126]: E0517 00:42:24.418174 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.418230 kubelet[2126]: W0517 00:42:24.418221 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.418275 kubelet[2126]: E0517 00:42:24.418268 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.418414 kubelet[2126]: E0517 00:42:24.418408 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.418461 kubelet[2126]: W0517 00:42:24.418453 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.418507 kubelet[2126]: E0517 00:42:24.418500 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.418670 kubelet[2126]: E0517 00:42:24.418664 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.418717 kubelet[2126]: W0517 00:42:24.418709 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.418763 kubelet[2126]: E0517 00:42:24.418756 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.418889 kubelet[2126]: E0517 00:42:24.418883 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.425119 kubelet[2126]: W0517 00:42:24.418941 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.425119 kubelet[2126]: E0517 00:42:24.418949 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.425119 kubelet[2126]: E0517 00:42:24.419052 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.425119 kubelet[2126]: W0517 00:42:24.419057 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.425119 kubelet[2126]: E0517 00:42:24.419062 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.425119 kubelet[2126]: E0517 00:42:24.419154 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.425119 kubelet[2126]: W0517 00:42:24.419159 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.425119 kubelet[2126]: E0517 00:42:24.419164 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.425119 kubelet[2126]: E0517 00:42:24.419245 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.425119 kubelet[2126]: W0517 00:42:24.419250 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.425390 kubelet[2126]: E0517 00:42:24.419254 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.435561 kubelet[2126]: E0517 00:42:24.435549 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.435624 kubelet[2126]: W0517 00:42:24.435615 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.435673 kubelet[2126]: E0517 00:42:24.435665 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.435860 kubelet[2126]: E0517 00:42:24.435854 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.435914 kubelet[2126]: W0517 00:42:24.435905 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.435996 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.436130 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.439778 kubelet[2126]: W0517 00:42:24.436142 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.436153 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.436270 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.439778 kubelet[2126]: W0517 00:42:24.436277 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.436284 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.436372 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.439778 kubelet[2126]: W0517 00:42:24.436398 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439778 kubelet[2126]: E0517 00:42:24.436404 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.436538 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.439995 kubelet[2126]: W0517 00:42:24.436544 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.436552 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.436853 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.439995 kubelet[2126]: W0517 00:42:24.436858 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.436869 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.436969 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.439995 kubelet[2126]: W0517 00:42:24.436974 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.436979 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.439995 kubelet[2126]: E0517 00:42:24.437140 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440195 kubelet[2126]: W0517 00:42:24.437146 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440195 kubelet[2126]: E0517 00:42:24.437152 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440195 kubelet[2126]: E0517 00:42:24.437277 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440195 kubelet[2126]: W0517 00:42:24.437284 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440195 kubelet[2126]: E0517 00:42:24.437289 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440195 kubelet[2126]: E0517 00:42:24.437390 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440195 kubelet[2126]: W0517 00:42:24.437395 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440195 kubelet[2126]: E0517 00:42:24.437400 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440195 kubelet[2126]: E0517 00:42:24.437491 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440195 kubelet[2126]: W0517 00:42:24.437495 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437500 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437674 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440387 kubelet[2126]: W0517 00:42:24.437680 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437686 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437809 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440387 kubelet[2126]: W0517 00:42:24.437814 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437820 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437954 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440387 kubelet[2126]: W0517 00:42:24.437959 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440387 kubelet[2126]: E0517 00:42:24.437964 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440574 kubelet[2126]: E0517 00:42:24.438066 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440574 kubelet[2126]: W0517 00:42:24.438071 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440574 kubelet[2126]: E0517 00:42:24.438076 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440574 kubelet[2126]: E0517 00:42:24.438203 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440574 kubelet[2126]: W0517 00:42:24.438208 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440574 kubelet[2126]: E0517 00:42:24.438213 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.440574 kubelet[2126]: E0517 00:42:24.438440 2126 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:42:24.440574 kubelet[2126]: W0517 00:42:24.438445 2126 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:42:24.440574 kubelet[2126]: E0517 00:42:24.438451 2126 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:42:24.445983 env[1255]: time="2025-05-17T00:42:24.445955443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:24.448129 env[1255]: time="2025-05-17T00:42:24.448109597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:24.449401 env[1255]: time="2025-05-17T00:42:24.449193871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:24.451157 env[1255]: time="2025-05-17T00:42:24.450421416Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:24.452673 env[1255]: time="2025-05-17T00:42:24.450922127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:42:24.455106 env[1255]: time="2025-05-17T00:42:24.455077827Z" level=info msg="CreateContainer within sandbox \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:42:24.462660 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2000372948.mount: Deactivated successfully. May 17 00:42:24.464531 env[1255]: time="2025-05-17T00:42:24.464451153Z" level=info msg="CreateContainer within sandbox \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c\"" May 17 00:42:24.465734 env[1255]: time="2025-05-17T00:42:24.464846162Z" level=info msg="StartContainer for \"8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c\"" May 17 00:42:24.486271 systemd[1]: Started cri-containerd-8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c.scope. May 17 00:42:24.499000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.499000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fd6c0fb6018 items=0 ppid=2598 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:24.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323933313662643966346132313938376531333761323839343165 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit: BPF prog-id=127 op=LOAD May 17 00:42:24.500000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000388208 items=0 ppid=2598 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:24.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323933313662643966346132313938376531333761323839343165 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.500000 audit: BPF prog-id=128 op=LOAD May 17 00:42:24.500000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000388258 items=0 ppid=2598 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:24.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323933313662643966346132313938376531333761323839343165 May 17 00:42:24.501000 audit: BPF prog-id=128 op=UNLOAD May 17 00:42:24.501000 audit: BPF prog-id=127 op=UNLOAD May 17 00:42:24.501000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:24.501000 audit: BPF prog-id=129 op=LOAD May 17 00:42:24.501000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003882e8 items=0 ppid=2598 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:24.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323933313662643966346132313938376531333761323839343165 May 17 00:42:24.518724 env[1255]: time="2025-05-17T00:42:24.518696420Z" level=info msg="StartContainer for \"8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c\" returns successfully" May 17 00:42:24.521546 systemd[1]: cri-containerd-8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c.scope: Deactivated successfully. May 17 00:42:24.525000 audit: BPF prog-id=129 op=UNLOAD May 17 00:42:24.617189 env[1255]: time="2025-05-17T00:42:24.617152848Z" level=info msg="shim disconnected" id=8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c May 17 00:42:24.617423 env[1255]: time="2025-05-17T00:42:24.617372987Z" level=warning msg="cleaning up after shim disconnected" id=8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c namespace=k8s.io May 17 00:42:24.617508 env[1255]: time="2025-05-17T00:42:24.617494741Z" level=info msg="cleaning up dead shim" May 17 00:42:24.622925 env[1255]: time="2025-05-17T00:42:24.622892855Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2828 runtime=io.containerd.runc.v2\n" May 17 00:42:25.021360 systemd[1]: run-containerd-runc-k8s.io-8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c-runc.VajVcN.mount: Deactivated successfully. May 17 00:42:25.021730 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8129316bd9f4a21987e137a28941ece828f135c543c50e4af944a0510cb7520c-rootfs.mount: Deactivated successfully. May 17 00:42:25.368269 env[1255]: time="2025-05-17T00:42:25.368242815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:42:25.394806 kubelet[2126]: I0517 00:42:25.394766 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-f6fcc847b-9pmc8" podStartSLOduration=3.175608097 podStartE2EDuration="5.394754074s" podCreationTimestamp="2025-05-17 00:42:20 +0000 UTC" firstStartedPulling="2025-05-17 00:42:20.794971201 +0000 UTC m=+15.810552403" lastFinishedPulling="2025-05-17 00:42:23.014117175 +0000 UTC m=+18.029698380" observedRunningTime="2025-05-17 00:42:23.420719698 +0000 UTC m=+18.436300909" watchObservedRunningTime="2025-05-17 00:42:25.394754074 +0000 UTC m=+20.410335281" May 17 00:42:26.311114 kubelet[2126]: E0517 00:42:26.311083 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:28.311095 kubelet[2126]: E0517 00:42:28.311066 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:29.689054 env[1255]: time="2025-05-17T00:42:29.689014631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.693777 env[1255]: time="2025-05-17T00:42:29.693753162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.695867 env[1255]: time="2025-05-17T00:42:29.695845220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.698619 env[1255]: time="2025-05-17T00:42:29.698602722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.698919 env[1255]: time="2025-05-17T00:42:29.698891957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:42:29.703721 env[1255]: time="2025-05-17T00:42:29.703685328Z" level=info msg="CreateContainer within sandbox \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:42:29.724798 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3868989089.mount: Deactivated successfully. May 17 00:42:29.740370 env[1255]: time="2025-05-17T00:42:29.740338905Z" level=info msg="CreateContainer within sandbox \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82\"" May 17 00:42:29.740850 env[1255]: time="2025-05-17T00:42:29.740829922Z" level=info msg="StartContainer for \"08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82\"" May 17 00:42:29.763198 systemd[1]: Started cri-containerd-08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82.scope. May 17 00:42:29.777000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780005 kernel: kauditd_printk_skb: 91 callbacks suppressed May 17 00:42:29.780072 kernel: audit: type=1400 audit(1747442549.777:935): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.777000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f37b5228f18 items=0 ppid=2598 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.786555 kernel: audit: type=1300 audit(1747442549.777:935): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f37b5228f18 items=0 ppid=2598 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.786589 kernel: audit: type=1327 audit(1747442549.777:935): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613062636338383532663639316239363235373562346137626639 May 17 00:42:29.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613062636338383532663639316239363235373562346137626639 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.792631 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.795259 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.795281 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.797696 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.800252 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.802913 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.808404 kernel: audit: type=1400 audit(1747442549.780:936): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.780000 audit: BPF prog-id=130 op=LOAD May 17 00:42:29.780000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003d0038 items=0 ppid=2598 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613062636338383532663639316239363235373562346137626639 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.785000 audit: BPF prog-id=131 op=LOAD May 17 00:42:29.785000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003d0088 items=0 ppid=2598 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613062636338383532663639316239363235373562346137626639 May 17 00:42:29.794000 audit: BPF prog-id=131 op=UNLOAD May 17 00:42:29.794000 audit: BPF prog-id=130 op=UNLOAD May 17 00:42:29.794000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.794000 audit: BPF prog-id=132 op=LOAD May 17 00:42:29.794000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003d0118 items=0 ppid=2598 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613062636338383532663639316239363235373562346137626639 May 17 00:42:29.821609 env[1255]: time="2025-05-17T00:42:29.821578542Z" level=info msg="StartContainer for \"08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82\" returns successfully" May 17 00:42:30.311572 kubelet[2126]: E0517 00:42:30.311543 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:31.892945 env[1255]: time="2025-05-17T00:42:31.892750421Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:42:31.894397 systemd[1]: cri-containerd-08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82.scope: Deactivated successfully. May 17 00:42:31.896000 audit: BPF prog-id=132 op=UNLOAD May 17 00:42:31.918825 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82-rootfs.mount: Deactivated successfully. May 17 00:42:31.955182 kubelet[2126]: I0517 00:42:31.919898 2126 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:42:31.992899 env[1255]: time="2025-05-17T00:42:31.992835499Z" level=info msg="shim disconnected" id=08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82 May 17 00:42:31.992899 env[1255]: time="2025-05-17T00:42:31.992870199Z" level=warning msg="cleaning up after shim disconnected" id=08a0bcc8852f691b962575b4a7bf95e2078a69fecf2ade5f53b2ee7becc74e82 namespace=k8s.io May 17 00:42:31.992899 env[1255]: time="2025-05-17T00:42:31.992878103Z" level=info msg="cleaning up dead shim" May 17 00:42:31.999954 env[1255]: time="2025-05-17T00:42:31.999928892Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2890 runtime=io.containerd.runc.v2\n" May 17 00:42:32.133528 systemd[1]: Created slice kubepods-burstable-pod31a50143_b38b_436f_9b87_2b078a019036.slice. May 17 00:42:32.143850 systemd[1]: Created slice kubepods-besteffort-poda299081f_1077_4b1b_91a0_9abc8b5a40d8.slice. May 17 00:42:32.195764 systemd[1]: Created slice kubepods-burstable-pod8dc7f54e_cda6_468d_b616_716c37ee92f8.slice. May 17 00:42:32.221033 systemd[1]: Created slice kubepods-besteffort-pod9142503b_b745_4f0d_9478_192201d8719a.slice. May 17 00:42:32.225369 systemd[1]: Created slice kubepods-besteffort-pod2999001c_b44d_4ddb_8117_53b580949709.slice. May 17 00:42:32.251443 systemd[1]: Created slice kubepods-besteffort-pod8871d705_da6a_40f6_bbd3_3e5f159b36d3.slice. May 17 00:42:32.254718 systemd[1]: Created slice kubepods-besteffort-pod53e1d52b_66eb_4d04_b85e_c5d1304df65c.slice. May 17 00:42:32.309195 kubelet[2126]: I0517 00:42:32.309168 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zsqc7\" (UniqueName: \"kubernetes.io/projected/8871d705-da6a-40f6-bbd3-3e5f159b36d3-kube-api-access-zsqc7\") pod \"calico-apiserver-75dcd5ccd6-plw7j\" (UID: \"8871d705-da6a-40f6-bbd3-3e5f159b36d3\") " pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" May 17 00:42:32.309594 kubelet[2126]: I0517 00:42:32.309579 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mvnnb\" (UniqueName: \"kubernetes.io/projected/9142503b-b745-4f0d-9478-192201d8719a-kube-api-access-mvnnb\") pod \"whisker-6dbd79f4b5-24ktd\" (UID: \"9142503b-b745-4f0d-9478-192201d8719a\") " pod="calico-system/whisker-6dbd79f4b5-24ktd" May 17 00:42:32.309695 kubelet[2126]: I0517 00:42:32.309682 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/53e1d52b-66eb-4d04-b85e-c5d1304df65c-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-nwrcr\" (UID: \"53e1d52b-66eb-4d04-b85e-c5d1304df65c\") " pod="calico-system/goldmane-78d55f7ddc-nwrcr" May 17 00:42:32.309789 kubelet[2126]: I0517 00:42:32.309776 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7n8w\" (UniqueName: \"kubernetes.io/projected/a299081f-1077-4b1b-91a0-9abc8b5a40d8-kube-api-access-r7n8w\") pod \"calico-kube-controllers-779d9bfb7-f5cmw\" (UID: \"a299081f-1077-4b1b-91a0-9abc8b5a40d8\") " pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" May 17 00:42:32.309884 kubelet[2126]: I0517 00:42:32.309866 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a299081f-1077-4b1b-91a0-9abc8b5a40d8-tigera-ca-bundle\") pod \"calico-kube-controllers-779d9bfb7-f5cmw\" (UID: \"a299081f-1077-4b1b-91a0-9abc8b5a40d8\") " pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" May 17 00:42:32.309986 kubelet[2126]: I0517 00:42:32.309973 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/31a50143-b38b-436f-9b87-2b078a019036-config-volume\") pod \"coredns-674b8bbfcf-tlp7m\" (UID: \"31a50143-b38b-436f-9b87-2b078a019036\") " pod="kube-system/coredns-674b8bbfcf-tlp7m" May 17 00:42:32.310074 kubelet[2126]: I0517 00:42:32.310063 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sc86p\" (UniqueName: \"kubernetes.io/projected/31a50143-b38b-436f-9b87-2b078a019036-kube-api-access-sc86p\") pod \"coredns-674b8bbfcf-tlp7m\" (UID: \"31a50143-b38b-436f-9b87-2b078a019036\") " pod="kube-system/coredns-674b8bbfcf-tlp7m" May 17 00:42:32.310159 kubelet[2126]: I0517 00:42:32.310147 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d2hkx\" (UniqueName: \"kubernetes.io/projected/2999001c-b44d-4ddb-8117-53b580949709-kube-api-access-d2hkx\") pod \"calico-apiserver-75dcd5ccd6-j7l42\" (UID: \"2999001c-b44d-4ddb-8117-53b580949709\") " pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" May 17 00:42:32.310264 kubelet[2126]: I0517 00:42:32.310244 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53e1d52b-66eb-4d04-b85e-c5d1304df65c-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-nwrcr\" (UID: \"53e1d52b-66eb-4d04-b85e-c5d1304df65c\") " pod="calico-system/goldmane-78d55f7ddc-nwrcr" May 17 00:42:32.310345 kubelet[2126]: I0517 00:42:32.310334 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rfqzj\" (UniqueName: \"kubernetes.io/projected/53e1d52b-66eb-4d04-b85e-c5d1304df65c-kube-api-access-rfqzj\") pod \"goldmane-78d55f7ddc-nwrcr\" (UID: \"53e1d52b-66eb-4d04-b85e-c5d1304df65c\") " pod="calico-system/goldmane-78d55f7ddc-nwrcr" May 17 00:42:32.310438 kubelet[2126]: I0517 00:42:32.310425 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8871d705-da6a-40f6-bbd3-3e5f159b36d3-calico-apiserver-certs\") pod \"calico-apiserver-75dcd5ccd6-plw7j\" (UID: \"8871d705-da6a-40f6-bbd3-3e5f159b36d3\") " pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" May 17 00:42:32.310526 kubelet[2126]: I0517 00:42:32.310515 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8dc7f54e-cda6-468d-b616-716c37ee92f8-config-volume\") pod \"coredns-674b8bbfcf-56l6r\" (UID: \"8dc7f54e-cda6-468d-b616-716c37ee92f8\") " pod="kube-system/coredns-674b8bbfcf-56l6r" May 17 00:42:32.310614 kubelet[2126]: I0517 00:42:32.310603 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4xkq8\" (UniqueName: \"kubernetes.io/projected/8dc7f54e-cda6-468d-b616-716c37ee92f8-kube-api-access-4xkq8\") pod \"coredns-674b8bbfcf-56l6r\" (UID: \"8dc7f54e-cda6-468d-b616-716c37ee92f8\") " pod="kube-system/coredns-674b8bbfcf-56l6r" May 17 00:42:32.310697 kubelet[2126]: I0517 00:42:32.310686 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/9142503b-b745-4f0d-9478-192201d8719a-whisker-backend-key-pair\") pod \"whisker-6dbd79f4b5-24ktd\" (UID: \"9142503b-b745-4f0d-9478-192201d8719a\") " pod="calico-system/whisker-6dbd79f4b5-24ktd" May 17 00:42:32.321500 kubelet[2126]: I0517 00:42:32.310867 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9142503b-b745-4f0d-9478-192201d8719a-whisker-ca-bundle\") pod \"whisker-6dbd79f4b5-24ktd\" (UID: \"9142503b-b745-4f0d-9478-192201d8719a\") " pod="calico-system/whisker-6dbd79f4b5-24ktd" May 17 00:42:32.321500 kubelet[2126]: I0517 00:42:32.310883 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/53e1d52b-66eb-4d04-b85e-c5d1304df65c-config\") pod \"goldmane-78d55f7ddc-nwrcr\" (UID: \"53e1d52b-66eb-4d04-b85e-c5d1304df65c\") " pod="calico-system/goldmane-78d55f7ddc-nwrcr" May 17 00:42:32.321500 kubelet[2126]: I0517 00:42:32.310935 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2999001c-b44d-4ddb-8117-53b580949709-calico-apiserver-certs\") pod \"calico-apiserver-75dcd5ccd6-j7l42\" (UID: \"2999001c-b44d-4ddb-8117-53b580949709\") " pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" May 17 00:42:32.321633 env[1255]: time="2025-05-17T00:42:32.318858866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mckdw,Uid:d90242e4-0770-4c57-b411-99b69c529708,Namespace:calico-system,Attempt:0,}" May 17 00:42:32.316491 systemd[1]: Created slice kubepods-besteffort-podd90242e4_0770_4c57_b411_99b69c529708.slice. May 17 00:42:32.379744 env[1255]: time="2025-05-17T00:42:32.379717787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:42:32.494885 env[1255]: time="2025-05-17T00:42:32.493982751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-779d9bfb7-f5cmw,Uid:a299081f-1077-4b1b-91a0-9abc8b5a40d8,Namespace:calico-system,Attempt:0,}" May 17 00:42:32.534198 env[1255]: time="2025-05-17T00:42:32.534165628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-56l6r,Uid:8dc7f54e-cda6-468d-b616-716c37ee92f8,Namespace:kube-system,Attempt:0,}" May 17 00:42:32.534332 env[1255]: time="2025-05-17T00:42:32.534166533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-j7l42,Uid:2999001c-b44d-4ddb-8117-53b580949709,Namespace:calico-apiserver,Attempt:0,}" May 17 00:42:32.534444 env[1255]: time="2025-05-17T00:42:32.534425251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6dbd79f4b5-24ktd,Uid:9142503b-b745-4f0d-9478-192201d8719a,Namespace:calico-system,Attempt:0,}" May 17 00:42:32.553954 env[1255]: time="2025-05-17T00:42:32.553926511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-plw7j,Uid:8871d705-da6a-40f6-bbd3-3e5f159b36d3,Namespace:calico-apiserver,Attempt:0,}" May 17 00:42:32.556555 env[1255]: time="2025-05-17T00:42:32.556532544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nwrcr,Uid:53e1d52b-66eb-4d04-b85e-c5d1304df65c,Namespace:calico-system,Attempt:0,}" May 17 00:42:32.743456 env[1255]: time="2025-05-17T00:42:32.743367248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-tlp7m,Uid:31a50143-b38b-436f-9b87-2b078a019036,Namespace:kube-system,Attempt:0,}" May 17 00:42:32.902016 env[1255]: time="2025-05-17T00:42:32.901974771Z" level=error msg="Failed to destroy network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.902232 env[1255]: time="2025-05-17T00:42:32.902203797Z" level=error msg="encountered an error cleaning up failed sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.902259 env[1255]: time="2025-05-17T00:42:32.902232860Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-plw7j,Uid:8871d705-da6a-40f6-bbd3-3e5f159b36d3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.902829 env[1255]: time="2025-05-17T00:42:32.902804767Z" level=error msg="Failed to destroy network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.903040 env[1255]: time="2025-05-17T00:42:32.903011177Z" level=error msg="encountered an error cleaning up failed sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.903077 env[1255]: time="2025-05-17T00:42:32.903048115Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nwrcr,Uid:53e1d52b-66eb-4d04-b85e-c5d1304df65c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.936326 kubelet[2126]: E0517 00:42:32.935671 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.936326 kubelet[2126]: E0517 00:42:32.935757 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.936636 kubelet[2126]: E0517 00:42:32.936614 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" May 17 00:42:32.936913 kubelet[2126]: E0517 00:42:32.936831 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-nwrcr" May 17 00:42:32.938932 kubelet[2126]: E0517 00:42:32.937683 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-nwrcr" May 17 00:42:32.938932 kubelet[2126]: E0517 00:42:32.937733 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-nwrcr_calico-system(53e1d52b-66eb-4d04-b85e-c5d1304df65c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-nwrcr_calico-system(53e1d52b-66eb-4d04-b85e-c5d1304df65c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:42:32.939203 kubelet[2126]: E0517 00:42:32.939080 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" May 17 00:42:32.939203 kubelet[2126]: E0517 00:42:32.939126 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75dcd5ccd6-plw7j_calico-apiserver(8871d705-da6a-40f6-bbd3-3e5f159b36d3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75dcd5ccd6-plw7j_calico-apiserver(8871d705-da6a-40f6-bbd3-3e5f159b36d3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" podUID="8871d705-da6a-40f6-bbd3-3e5f159b36d3" May 17 00:42:32.947439 env[1255]: time="2025-05-17T00:42:32.943445524Z" level=error msg="Failed to destroy network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.947439 env[1255]: time="2025-05-17T00:42:32.944196342Z" level=error msg="Failed to destroy network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.947439 env[1255]: time="2025-05-17T00:42:32.944493994Z" level=error msg="encountered an error cleaning up failed sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.947439 env[1255]: time="2025-05-17T00:42:32.944538633Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-56l6r,Uid:8dc7f54e-cda6-468d-b616-716c37ee92f8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.947439 env[1255]: time="2025-05-17T00:42:32.944741182Z" level=error msg="encountered an error cleaning up failed sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.947439 env[1255]: time="2025-05-17T00:42:32.944770910Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-779d9bfb7-f5cmw,Uid:a299081f-1077-4b1b-91a0-9abc8b5a40d8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.945167 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b-shm.mount: Deactivated successfully. May 17 00:42:32.946976 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82-shm.mount: Deactivated successfully. May 17 00:42:32.950268 kubelet[2126]: E0517 00:42:32.947975 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.950268 kubelet[2126]: E0517 00:42:32.948016 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" May 17 00:42:32.950268 kubelet[2126]: E0517 00:42:32.948030 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" May 17 00:42:32.950397 kubelet[2126]: E0517 00:42:32.948068 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-779d9bfb7-f5cmw_calico-system(a299081f-1077-4b1b-91a0-9abc8b5a40d8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-779d9bfb7-f5cmw_calico-system(a299081f-1077-4b1b-91a0-9abc8b5a40d8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" podUID="a299081f-1077-4b1b-91a0-9abc8b5a40d8" May 17 00:42:32.950397 kubelet[2126]: E0517 00:42:32.948319 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.950397 kubelet[2126]: E0517 00:42:32.948345 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-56l6r" May 17 00:42:32.951208 kubelet[2126]: E0517 00:42:32.948357 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-56l6r" May 17 00:42:32.951208 kubelet[2126]: E0517 00:42:32.948453 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-56l6r_kube-system(8dc7f54e-cda6-468d-b616-716c37ee92f8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-56l6r_kube-system(8dc7f54e-cda6-468d-b616-716c37ee92f8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-56l6r" podUID="8dc7f54e-cda6-468d-b616-716c37ee92f8" May 17 00:42:32.962652 env[1255]: time="2025-05-17T00:42:32.962607247Z" level=error msg="Failed to destroy network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.965150 env[1255]: time="2025-05-17T00:42:32.962881609Z" level=error msg="encountered an error cleaning up failed sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.965150 env[1255]: time="2025-05-17T00:42:32.962917145Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mckdw,Uid:d90242e4-0770-4c57-b411-99b69c529708,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.964642 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf-shm.mount: Deactivated successfully. May 17 00:42:32.966093 kubelet[2126]: E0517 00:42:32.965337 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.966093 kubelet[2126]: E0517 00:42:32.965394 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mckdw" May 17 00:42:32.966093 kubelet[2126]: E0517 00:42:32.965409 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mckdw" May 17 00:42:32.969045 kubelet[2126]: E0517 00:42:32.965451 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mckdw_calico-system(d90242e4-0770-4c57-b411-99b69c529708)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mckdw_calico-system(d90242e4-0770-4c57-b411-99b69c529708)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:32.968073 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac-shm.mount: Deactivated successfully. May 17 00:42:32.969145 env[1255]: time="2025-05-17T00:42:32.966481068Z" level=error msg="Failed to destroy network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.969145 env[1255]: time="2025-05-17T00:42:32.966573886Z" level=error msg="Failed to destroy network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.969374 env[1255]: time="2025-05-17T00:42:32.969342939Z" level=error msg="encountered an error cleaning up failed sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.969475 env[1255]: time="2025-05-17T00:42:32.969451887Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-j7l42,Uid:2999001c-b44d-4ddb-8117-53b580949709,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.970258 kubelet[2126]: E0517 00:42:32.970005 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.970258 kubelet[2126]: E0517 00:42:32.970038 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" May 17 00:42:32.970258 kubelet[2126]: E0517 00:42:32.970058 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" May 17 00:42:32.970367 kubelet[2126]: E0517 00:42:32.970104 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75dcd5ccd6-j7l42_calico-apiserver(2999001c-b44d-4ddb-8117-53b580949709)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75dcd5ccd6-j7l42_calico-apiserver(2999001c-b44d-4ddb-8117-53b580949709)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" podUID="2999001c-b44d-4ddb-8117-53b580949709" May 17 00:42:32.970497 env[1255]: time="2025-05-17T00:42:32.970481100Z" level=error msg="Failed to destroy network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.970713 env[1255]: time="2025-05-17T00:42:32.970695684Z" level=error msg="encountered an error cleaning up failed sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.970940 env[1255]: time="2025-05-17T00:42:32.970924204Z" level=error msg="encountered an error cleaning up failed sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.971036 env[1255]: time="2025-05-17T00:42:32.971019688Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6dbd79f4b5-24ktd,Uid:9142503b-b745-4f0d-9478-192201d8719a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.971148 env[1255]: time="2025-05-17T00:42:32.971006979Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-tlp7m,Uid:31a50143-b38b-436f-9b87-2b078a019036,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.971443 kubelet[2126]: E0517 00:42:32.971265 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.971443 kubelet[2126]: E0517 00:42:32.971305 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6dbd79f4b5-24ktd" May 17 00:42:32.971443 kubelet[2126]: E0517 00:42:32.971320 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6dbd79f4b5-24ktd" May 17 00:42:32.971579 kubelet[2126]: E0517 00:42:32.971348 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6dbd79f4b5-24ktd_calico-system(9142503b-b745-4f0d-9478-192201d8719a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6dbd79f4b5-24ktd_calico-system(9142503b-b745-4f0d-9478-192201d8719a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6dbd79f4b5-24ktd" podUID="9142503b-b745-4f0d-9478-192201d8719a" May 17 00:42:32.971750 kubelet[2126]: E0517 00:42:32.971731 2126 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:32.971810 kubelet[2126]: E0517 00:42:32.971755 2126 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-tlp7m" May 17 00:42:32.971810 kubelet[2126]: E0517 00:42:32.971772 2126 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-tlp7m" May 17 00:42:32.971905 kubelet[2126]: E0517 00:42:32.971806 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-tlp7m_kube-system(31a50143-b38b-436f-9b87-2b078a019036)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-tlp7m_kube-system(31a50143-b38b-436f-9b87-2b078a019036)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-tlp7m" podUID="31a50143-b38b-436f-9b87-2b078a019036" May 17 00:42:33.384012 kubelet[2126]: I0517 00:42:33.383996 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:42:33.384781 kubelet[2126]: I0517 00:42:33.384696 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:42:33.405305 kubelet[2126]: I0517 00:42:33.405292 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:42:33.412347 kubelet[2126]: I0517 00:42:33.405908 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:42:33.412347 kubelet[2126]: I0517 00:42:33.406435 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:42:33.412347 kubelet[2126]: I0517 00:42:33.406943 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:42:33.412347 kubelet[2126]: I0517 00:42:33.407443 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:42:33.412347 kubelet[2126]: I0517 00:42:33.407922 2126 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:42:33.475395 env[1255]: time="2025-05-17T00:42:33.475174554Z" level=info msg="StopPodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\"" May 17 00:42:33.475395 env[1255]: time="2025-05-17T00:42:33.475205289Z" level=info msg="StopPodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\"" May 17 00:42:33.475395 env[1255]: time="2025-05-17T00:42:33.475289069Z" level=info msg="StopPodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\"" May 17 00:42:33.476001 env[1255]: time="2025-05-17T00:42:33.475692404Z" level=info msg="StopPodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\"" May 17 00:42:33.476001 env[1255]: time="2025-05-17T00:42:33.475878518Z" level=info msg="StopPodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\"" May 17 00:42:33.476067 env[1255]: time="2025-05-17T00:42:33.476016651Z" level=info msg="StopPodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\"" May 17 00:42:33.476160 env[1255]: time="2025-05-17T00:42:33.475176979Z" level=info msg="StopPodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\"" May 17 00:42:33.476420 env[1255]: time="2025-05-17T00:42:33.476403131Z" level=info msg="StopPodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\"" May 17 00:42:33.499901 env[1255]: time="2025-05-17T00:42:33.499866032Z" level=error msg="StopPodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" failed" error="failed to destroy network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.500175 kubelet[2126]: E0517 00:42:33.500136 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:42:33.500244 kubelet[2126]: E0517 00:42:33.500190 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08"} May 17 00:42:33.500244 kubelet[2126]: E0517 00:42:33.500234 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31a50143-b38b-436f-9b87-2b078a019036\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.500334 kubelet[2126]: E0517 00:42:33.500257 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31a50143-b38b-436f-9b87-2b078a019036\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-tlp7m" podUID="31a50143-b38b-436f-9b87-2b078a019036" May 17 00:42:33.522613 env[1255]: time="2025-05-17T00:42:33.522571130Z" level=error msg="StopPodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" failed" error="failed to destroy network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.522855 kubelet[2126]: E0517 00:42:33.522827 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:42:33.522918 kubelet[2126]: E0517 00:42:33.522863 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7"} May 17 00:42:33.522918 kubelet[2126]: E0517 00:42:33.522884 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53e1d52b-66eb-4d04-b85e-c5d1304df65c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.522918 kubelet[2126]: E0517 00:42:33.522904 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53e1d52b-66eb-4d04-b85e-c5d1304df65c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:42:33.527545 env[1255]: time="2025-05-17T00:42:33.527503112Z" level=error msg="StopPodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" failed" error="failed to destroy network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.527837 kubelet[2126]: E0517 00:42:33.527738 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:42:33.527837 kubelet[2126]: E0517 00:42:33.527777 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b"} May 17 00:42:33.527837 kubelet[2126]: E0517 00:42:33.527798 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8dc7f54e-cda6-468d-b616-716c37ee92f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.527837 kubelet[2126]: E0517 00:42:33.527814 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8dc7f54e-cda6-468d-b616-716c37ee92f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-56l6r" podUID="8dc7f54e-cda6-468d-b616-716c37ee92f8" May 17 00:42:33.542458 env[1255]: time="2025-05-17T00:42:33.542408606Z" level=error msg="StopPodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" failed" error="failed to destroy network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.542596 env[1255]: time="2025-05-17T00:42:33.542497454Z" level=error msg="StopPodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" failed" error="failed to destroy network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.544712 kubelet[2126]: E0517 00:42:33.544691 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:42:33.544774 kubelet[2126]: E0517 00:42:33.544717 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99"} May 17 00:42:33.544774 kubelet[2126]: E0517 00:42:33.544741 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9142503b-b745-4f0d-9478-192201d8719a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.544774 kubelet[2126]: E0517 00:42:33.544756 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9142503b-b745-4f0d-9478-192201d8719a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6dbd79f4b5-24ktd" podUID="9142503b-b745-4f0d-9478-192201d8719a" May 17 00:42:33.544887 kubelet[2126]: E0517 00:42:33.544777 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:42:33.544887 kubelet[2126]: E0517 00:42:33.544796 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac"} May 17 00:42:33.544887 kubelet[2126]: E0517 00:42:33.544810 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8871d705-da6a-40f6-bbd3-3e5f159b36d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.544887 kubelet[2126]: E0517 00:42:33.544821 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8871d705-da6a-40f6-bbd3-3e5f159b36d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" podUID="8871d705-da6a-40f6-bbd3-3e5f159b36d3" May 17 00:42:33.553992 env[1255]: time="2025-05-17T00:42:33.553948840Z" level=error msg="StopPodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" failed" error="failed to destroy network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.554390 kubelet[2126]: E0517 00:42:33.554251 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:42:33.554390 kubelet[2126]: E0517 00:42:33.554290 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac"} May 17 00:42:33.554390 kubelet[2126]: E0517 00:42:33.554330 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2999001c-b44d-4ddb-8117-53b580949709\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.554390 kubelet[2126]: E0517 00:42:33.554351 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2999001c-b44d-4ddb-8117-53b580949709\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" podUID="2999001c-b44d-4ddb-8117-53b580949709" May 17 00:42:33.563547 env[1255]: time="2025-05-17T00:42:33.563517378Z" level=error msg="StopPodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" failed" error="failed to destroy network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.563909 kubelet[2126]: E0517 00:42:33.563796 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:42:33.563909 kubelet[2126]: E0517 00:42:33.563829 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82"} May 17 00:42:33.563909 kubelet[2126]: E0517 00:42:33.563853 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a299081f-1077-4b1b-91a0-9abc8b5a40d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.563909 kubelet[2126]: E0517 00:42:33.563887 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a299081f-1077-4b1b-91a0-9abc8b5a40d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" podUID="a299081f-1077-4b1b-91a0-9abc8b5a40d8" May 17 00:42:33.566865 kubelet[2126]: E0517 00:42:33.564364 2126 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:42:33.566865 kubelet[2126]: E0517 00:42:33.564406 2126 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf"} May 17 00:42:33.566865 kubelet[2126]: E0517 00:42:33.564425 2126 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d90242e4-0770-4c57-b411-99b69c529708\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:42:33.566865 kubelet[2126]: E0517 00:42:33.564444 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d90242e4-0770-4c57-b411-99b69c529708\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mckdw" podUID="d90242e4-0770-4c57-b411-99b69c529708" May 17 00:42:33.567008 env[1255]: time="2025-05-17T00:42:33.564277986Z" level=error msg="StopPodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" failed" error="failed to destroy network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:42:33.919805 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08-shm.mount: Deactivated successfully. May 17 00:42:33.919896 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99-shm.mount: Deactivated successfully. May 17 00:42:38.923201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2661088215.mount: Deactivated successfully. May 17 00:42:38.962442 env[1255]: time="2025-05-17T00:42:38.962406250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:38.965046 env[1255]: time="2025-05-17T00:42:38.965030935Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:38.965890 env[1255]: time="2025-05-17T00:42:38.965871738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:38.966689 env[1255]: time="2025-05-17T00:42:38.966673954Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:38.968702 env[1255]: time="2025-05-17T00:42:38.967031528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:42:39.017675 env[1255]: time="2025-05-17T00:42:39.017653035Z" level=info msg="CreateContainer within sandbox \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:42:39.064564 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2947453607.mount: Deactivated successfully. May 17 00:42:39.086185 env[1255]: time="2025-05-17T00:42:39.086157983Z" level=info msg="CreateContainer within sandbox \"ee008fee5c0658c1a01f5a4768dede95c0de8fd42d27a7e1d7f25a87bac38153\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"11a2b1f8ea27c693088a80fd19e98703799fd0e6c7c2dce1fc1684893f1e5a99\"" May 17 00:42:39.091155 env[1255]: time="2025-05-17T00:42:39.087714215Z" level=info msg="StartContainer for \"11a2b1f8ea27c693088a80fd19e98703799fd0e6c7c2dce1fc1684893f1e5a99\"" May 17 00:42:39.107803 systemd[1]: Started cri-containerd-11a2b1f8ea27c693088a80fd19e98703799fd0e6c7c2dce1fc1684893f1e5a99.scope. May 17 00:42:39.120000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.137474 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:42:39.137542 kernel: audit: type=1400 audit(1747442559.120:942): avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.137567 kernel: audit: type=1300 audit(1747442559.120:942): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9718005a88 items=0 ppid=2598 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.139993 kernel: audit: type=1327 audit(1747442559.120:942): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613262316638656132376336393330383861383066643139653938 May 17 00:42:39.140026 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.140058 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.145028 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.145059 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.145079 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9718005a88 items=0 ppid=2598 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.151785 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.151823 kernel: audit: type=1400 audit(1747442559.120:943): avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613262316638656132376336393330383861383066643139653938 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.120000 audit: BPF prog-id=133 op=LOAD May 17 00:42:39.120000 audit[3269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000298888 items=0 ppid=2598 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613262316638656132376336393330383861383066643139653938 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.127000 audit: BPF prog-id=134 op=LOAD May 17 00:42:39.127000 audit[3269]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002988d8 items=0 ppid=2598 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613262316638656132376336393330383861383066643139653938 May 17 00:42:39.128000 audit: BPF prog-id=134 op=UNLOAD May 17 00:42:39.128000 audit: BPF prog-id=133 op=UNLOAD May 17 00:42:39.128000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:39.128000 audit: BPF prog-id=135 op=LOAD May 17 00:42:39.128000 audit[3269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000298968 items=0 ppid=2598 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:39.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613262316638656132376336393330383861383066643139653938 May 17 00:42:39.158901 env[1255]: time="2025-05-17T00:42:39.158867847Z" level=info msg="StartContainer for \"11a2b1f8ea27c693088a80fd19e98703799fd0e6c7c2dce1fc1684893f1e5a99\" returns successfully" May 17 00:42:39.473016 kubelet[2126]: I0517 00:42:39.472966 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4www2" podStartSLOduration=1.640460609 podStartE2EDuration="19.463643516s" podCreationTimestamp="2025-05-17 00:42:20 +0000 UTC" firstStartedPulling="2025-05-17 00:42:21.144664869 +0000 UTC m=+16.160246073" lastFinishedPulling="2025-05-17 00:42:38.967847776 +0000 UTC m=+33.983428980" observedRunningTime="2025-05-17 00:42:39.45612952 +0000 UTC m=+34.471710740" watchObservedRunningTime="2025-05-17 00:42:39.463643516 +0000 UTC m=+34.479224730" May 17 00:42:40.365337 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:42:40.365804 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:42:40.759425 env[1255]: time="2025-05-17T00:42:40.759352542Z" level=info msg="StopPodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\"" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:40.938 [INFO][3323] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:40.939 [INFO][3323] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" iface="eth0" netns="/var/run/netns/cni-d93ea3dc-5413-094c-226d-e3980b655e5f" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:40.939 [INFO][3323] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" iface="eth0" netns="/var/run/netns/cni-d93ea3dc-5413-094c-226d-e3980b655e5f" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:40.940 [INFO][3323] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" iface="eth0" netns="/var/run/netns/cni-d93ea3dc-5413-094c-226d-e3980b655e5f" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:40.940 [INFO][3323] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:40.940 [INFO][3323] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.195 [INFO][3332] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.199 [INFO][3332] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.199 [INFO][3332] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.215 [WARNING][3332] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.215 [INFO][3332] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.217 [INFO][3332] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:41.222892 env[1255]: 2025-05-17 00:42:41.219 [INFO][3323] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:42:41.229018 systemd[1]: run-netns-cni\x2dd93ea3dc\x2d5413\x2d094c\x2d226d\x2de3980b655e5f.mount: Deactivated successfully. May 17 00:42:41.230192 env[1255]: time="2025-05-17T00:42:41.230165047Z" level=info msg="TearDown network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" successfully" May 17 00:42:41.230260 env[1255]: time="2025-05-17T00:42:41.230246072Z" level=info msg="StopPodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" returns successfully" May 17 00:42:41.337180 kubelet[2126]: I0517 00:42:41.337155 2126 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mvnnb\" (UniqueName: \"kubernetes.io/projected/9142503b-b745-4f0d-9478-192201d8719a-kube-api-access-mvnnb\") pod \"9142503b-b745-4f0d-9478-192201d8719a\" (UID: \"9142503b-b745-4f0d-9478-192201d8719a\") " May 17 00:42:41.338904 kubelet[2126]: I0517 00:42:41.338889 2126 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/9142503b-b745-4f0d-9478-192201d8719a-whisker-backend-key-pair\") pod \"9142503b-b745-4f0d-9478-192201d8719a\" (UID: \"9142503b-b745-4f0d-9478-192201d8719a\") " May 17 00:42:41.340733 systemd[1]: var-lib-kubelet-pods-9142503b\x2db745\x2d4f0d\x2d9478\x2d192201d8719a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmvnnb.mount: Deactivated successfully. May 17 00:42:41.342409 kubelet[2126]: I0517 00:42:41.342366 2126 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9142503b-b745-4f0d-9478-192201d8719a-whisker-ca-bundle\") pod \"9142503b-b745-4f0d-9478-192201d8719a\" (UID: \"9142503b-b745-4f0d-9478-192201d8719a\") " May 17 00:42:41.347041 kubelet[2126]: I0517 00:42:41.345303 2126 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/9142503b-b745-4f0d-9478-192201d8719a-kube-api-access-mvnnb" (OuterVolumeSpecName: "kube-api-access-mvnnb") pod "9142503b-b745-4f0d-9478-192201d8719a" (UID: "9142503b-b745-4f0d-9478-192201d8719a"). InnerVolumeSpecName "kube-api-access-mvnnb". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:42:41.347174 kubelet[2126]: I0517 00:42:41.346505 2126 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/9142503b-b745-4f0d-9478-192201d8719a-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "9142503b-b745-4f0d-9478-192201d8719a" (UID: "9142503b-b745-4f0d-9478-192201d8719a"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:42:41.350183 systemd[1]: var-lib-kubelet-pods-9142503b\x2db745\x2d4f0d\x2d9478\x2d192201d8719a-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:42:41.351235 kubelet[2126]: I0517 00:42:41.351218 2126 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/9142503b-b745-4f0d-9478-192201d8719a-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "9142503b-b745-4f0d-9478-192201d8719a" (UID: "9142503b-b745-4f0d-9478-192201d8719a"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:42:41.442673 systemd[1]: Removed slice kubepods-besteffort-pod9142503b_b745_4f0d_9478_192201d8719a.slice. May 17 00:42:41.444224 kubelet[2126]: I0517 00:42:41.443642 2126 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-mvnnb\" (UniqueName: \"kubernetes.io/projected/9142503b-b745-4f0d-9478-192201d8719a-kube-api-access-mvnnb\") on node \"localhost\" DevicePath \"\"" May 17 00:42:41.444224 kubelet[2126]: I0517 00:42:41.443720 2126 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/9142503b-b745-4f0d-9478-192201d8719a-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 17 00:42:41.444224 kubelet[2126]: I0517 00:42:41.443742 2126 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9142503b-b745-4f0d-9478-192201d8719a-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 17 00:42:41.516836 systemd[1]: Created slice kubepods-besteffort-podde81bf95_10d0_45c0_abc5_41dac89311e0.slice. May 17 00:42:41.545388 kubelet[2126]: I0517 00:42:41.545352 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/de81bf95-10d0-45c0-abc5-41dac89311e0-whisker-backend-key-pair\") pod \"whisker-55cbb6f5c7-pnl7s\" (UID: \"de81bf95-10d0-45c0-abc5-41dac89311e0\") " pod="calico-system/whisker-55cbb6f5c7-pnl7s" May 17 00:42:41.545388 kubelet[2126]: I0517 00:42:41.545384 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/de81bf95-10d0-45c0-abc5-41dac89311e0-whisker-ca-bundle\") pod \"whisker-55cbb6f5c7-pnl7s\" (UID: \"de81bf95-10d0-45c0-abc5-41dac89311e0\") " pod="calico-system/whisker-55cbb6f5c7-pnl7s" May 17 00:42:41.545503 kubelet[2126]: I0517 00:42:41.545399 2126 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vl28k\" (UniqueName: \"kubernetes.io/projected/de81bf95-10d0-45c0-abc5-41dac89311e0-kube-api-access-vl28k\") pod \"whisker-55cbb6f5c7-pnl7s\" (UID: \"de81bf95-10d0-45c0-abc5-41dac89311e0\") " pod="calico-system/whisker-55cbb6f5c7-pnl7s" May 17 00:42:41.822568 env[1255]: time="2025-05-17T00:42:41.822274312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-55cbb6f5c7-pnl7s,Uid:de81bf95-10d0-45c0-abc5-41dac89311e0,Namespace:calico-system,Attempt:0,}" May 17 00:42:41.901996 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:41.902062 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif080855a75f: link becomes ready May 17 00:42:41.907700 systemd-networkd[1066]: calif080855a75f: Link UP May 17 00:42:41.907803 systemd-networkd[1066]: calif080855a75f: Gained carrier May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.840 [INFO][3352] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.847 [INFO][3352] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0 whisker-55cbb6f5c7- calico-system de81bf95-10d0-45c0-abc5-41dac89311e0 891 0 2025-05-17 00:42:41 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:55cbb6f5c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-55cbb6f5c7-pnl7s eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calif080855a75f [] [] }} ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.847 [INFO][3352] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.861 [INFO][3365] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" HandleID="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Workload="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.862 [INFO][3365] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" HandleID="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Workload="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002356b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-55cbb6f5c7-pnl7s", "timestamp":"2025-05-17 00:42:41.86195379 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.862 [INFO][3365] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.862 [INFO][3365] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.862 [INFO][3365] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.868 [INFO][3365] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.877 [INFO][3365] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.879 [INFO][3365] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.880 [INFO][3365] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.881 [INFO][3365] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.881 [INFO][3365] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.882 [INFO][3365] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.883 [INFO][3365] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.886 [INFO][3365] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.886 [INFO][3365] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" host="localhost" May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.886 [INFO][3365] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:41.910581 env[1255]: 2025-05-17 00:42:41.886 [INFO][3365] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" HandleID="k8s-pod-network.137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Workload="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.912034 env[1255]: 2025-05-17 00:42:41.888 [INFO][3352] cni-plugin/k8s.go 418: Populated endpoint ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0", GenerateName:"whisker-55cbb6f5c7-", Namespace:"calico-system", SelfLink:"", UID:"de81bf95-10d0-45c0-abc5-41dac89311e0", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"55cbb6f5c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-55cbb6f5c7-pnl7s", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calif080855a75f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:41.912034 env[1255]: 2025-05-17 00:42:41.888 [INFO][3352] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.912034 env[1255]: 2025-05-17 00:42:41.888 [INFO][3352] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif080855a75f ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.912034 env[1255]: 2025-05-17 00:42:41.901 [INFO][3352] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.912034 env[1255]: 2025-05-17 00:42:41.901 [INFO][3352] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0", GenerateName:"whisker-55cbb6f5c7-", Namespace:"calico-system", SelfLink:"", UID:"de81bf95-10d0-45c0-abc5-41dac89311e0", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"55cbb6f5c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b", Pod:"whisker-55cbb6f5c7-pnl7s", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calif080855a75f", MAC:"be:d7:67:1b:63:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:41.912034 env[1255]: 2025-05-17 00:42:41.908 [INFO][3352] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b" Namespace="calico-system" Pod="whisker-55cbb6f5c7-pnl7s" WorkloadEndpoint="localhost-k8s-whisker--55cbb6f5c7--pnl7s-eth0" May 17 00:42:41.919650 env[1255]: time="2025-05-17T00:42:41.919283079Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:41.919650 env[1255]: time="2025-05-17T00:42:41.919314923Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:41.919650 env[1255]: time="2025-05-17T00:42:41.919324027Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:41.921261 env[1255]: time="2025-05-17T00:42:41.919830474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b pid=3387 runtime=io.containerd.runc.v2 May 17 00:42:41.930957 systemd[1]: Started cri-containerd-137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b.scope. May 17 00:42:41.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.941000 audit: BPF prog-id=136 op=LOAD May 17 00:42:41.941000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.941000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3387 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133376666333233633765366536323466666663363834616136323832 May 17 00:42:41.941000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.941000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3387 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133376666333233633765366536323466666663363834616136323832 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit: BPF prog-id=137 op=LOAD May 17 00:42:41.942000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002a2c40 items=0 ppid=3387 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133376666333233633765366536323466666663363834616136323832 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit: BPF prog-id=138 op=LOAD May 17 00:42:41.942000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002a2c88 items=0 ppid=3387 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133376666333233633765366536323466666663363834616136323832 May 17 00:42:41.942000 audit: BPF prog-id=138 op=UNLOAD May 17 00:42:41.942000 audit: BPF prog-id=137 op=UNLOAD May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:41.942000 audit: BPF prog-id=139 op=LOAD May 17 00:42:41.942000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002a3098 items=0 ppid=3387 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133376666333233633765366536323466666663363834616136323832 May 17 00:42:41.944429 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:41.968238 env[1255]: time="2025-05-17T00:42:41.968209065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-55cbb6f5c7-pnl7s,Uid:de81bf95-10d0-45c0-abc5-41dac89311e0,Namespace:calico-system,Attempt:0,} returns sandbox id \"137ff323c7e6e624fffc684aa628234c0e17415b64a81a29d3d9f00bb3351d3b\"" May 17 00:42:41.975170 env[1255]: time="2025-05-17T00:42:41.975147622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:42:41.996000 audit[3477]: AVC avc: denied { write } for pid=3477 comm="tee" name="fd" dev="proc" ino=37104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:41.997000 audit[3460]: AVC avc: denied { write } for pid=3460 comm="tee" name="fd" dev="proc" ino=37952 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:41.997000 audit[3460]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc94d467f1 a2=241 a3=1b6 items=1 ppid=3434 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.997000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:42:41.997000 audit: PATH item=0 name="/dev/fd/63" inode=37075 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:41.997000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:41.996000 audit[3477]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff118ca7f1 a2=241 a3=1b6 items=1 ppid=3444 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:41.996000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:42:41.996000 audit: PATH item=0 name="/dev/fd/63" inode=37099 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:41.996000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:42.006000 audit[3483]: AVC avc: denied { write } for pid=3483 comm="tee" name="fd" dev="proc" ino=37961 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:42.006000 audit[3483]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc0bf47f2 a2=241 a3=1b6 items=1 ppid=3445 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:42.006000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:42:42.006000 audit: PATH item=0 name="/dev/fd/63" inode=37947 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:42.006000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:42.007000 audit[3487]: AVC avc: denied { write } for pid=3487 comm="tee" name="fd" dev="proc" ino=37965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:42.007000 audit[3487]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda62d77f3 a2=241 a3=1b6 items=1 ppid=3431 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:42.007000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:42:42.007000 audit: PATH item=0 name="/dev/fd/63" inode=37108 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:42.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:42.007000 audit[3475]: AVC avc: denied { write } for pid=3475 comm="tee" name="fd" dev="proc" ino=37969 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:42.007000 audit[3475]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe677ad7f1 a2=241 a3=1b6 items=1 ppid=3441 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:42.007000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:42:42.007000 audit: PATH item=0 name="/dev/fd/63" inode=37094 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:42.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:42.017000 audit[3490]: AVC avc: denied { write } for pid=3490 comm="tee" name="fd" dev="proc" ino=37976 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:42.017000 audit[3490]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1c5117e2 a2=241 a3=1b6 items=1 ppid=3442 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:42.017000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:42:42.017000 audit: PATH item=0 name="/dev/fd/63" inode=37112 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:42.017000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:42.024000 audit[3499]: AVC avc: denied { write } for pid=3499 comm="tee" name="fd" dev="proc" ino=37981 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:42:42.024000 audit[3499]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0d56a7e1 a2=241 a3=1b6 items=1 ppid=3432 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:42.024000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:42:42.024000 audit: PATH item=0 name="/dev/fd/63" inode=37973 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:42.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:42:42.265608 env[1255]: time="2025-05-17T00:42:42.265566855Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:42.265869 env[1255]: time="2025-05-17T00:42:42.265848199Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:42.267194 kubelet[2126]: E0517 00:42:42.267167 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:42.267252 kubelet[2126]: E0517 00:42:42.267207 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:42.271819 kubelet[2126]: E0517 00:42:42.271779 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:cf0ee066c06f40c3a296171ef7dbd085,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:42.273488 env[1255]: time="2025-05-17T00:42:42.273460187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:42:42.510611 env[1255]: time="2025-05-17T00:42:42.510578504Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:42.511051 env[1255]: time="2025-05-17T00:42:42.511034376Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:42.511470 kubelet[2126]: E0517 00:42:42.511209 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:42.511470 kubelet[2126]: E0517 00:42:42.511240 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:42.511667 kubelet[2126]: E0517 00:42:42.511313 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:42.512437 kubelet[2126]: E0517 00:42:42.512415 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55cbb6f5c7-pnl7s" podUID="de81bf95-10d0-45c0-abc5-41dac89311e0" May 17 00:42:43.329215 kubelet[2126]: I0517 00:42:43.329057 2126 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="9142503b-b745-4f0d-9478-192201d8719a" path="/var/lib/kubelet/pods/9142503b-b745-4f0d-9478-192201d8719a/volumes" May 17 00:42:43.439674 kubelet[2126]: E0517 00:42:43.439651 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55cbb6f5c7-pnl7s" podUID="de81bf95-10d0-45c0-abc5-41dac89311e0" May 17 00:42:43.474000 audit[3530]: NETFILTER_CFG table=filter:97 family=2 entries=22 op=nft_register_rule pid=3530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:43.474000 audit[3530]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe3ae4c980 a2=0 a3=7ffe3ae4c96c items=0 ppid=2280 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:43.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:43.479000 audit[3530]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:43.479000 audit[3530]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe3ae4c980 a2=0 a3=0 items=0 ppid=2280 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:43.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:43.650398 systemd-networkd[1066]: calif080855a75f: Gained IPv6LL May 17 00:42:44.311512 kubelet[2126]: I0517 00:42:44.311492 2126 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:44.317985 env[1255]: time="2025-05-17T00:42:44.312608346Z" level=info msg="StopPodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\"" May 17 00:42:44.317985 env[1255]: time="2025-05-17T00:42:44.312821602Z" level=info msg="StopPodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\"" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.394 [INFO][3569] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.394 [INFO][3569] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" iface="eth0" netns="/var/run/netns/cni-93757c48-401b-efe7-3ee4-4cad66ed6627" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.395 [INFO][3569] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" iface="eth0" netns="/var/run/netns/cni-93757c48-401b-efe7-3ee4-4cad66ed6627" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.400 [INFO][3569] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" iface="eth0" netns="/var/run/netns/cni-93757c48-401b-efe7-3ee4-4cad66ed6627" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.400 [INFO][3569] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.400 [INFO][3569] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.426 [INFO][3583] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.426 [INFO][3583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.426 [INFO][3583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.431 [WARNING][3583] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.431 [INFO][3583] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.432 [INFO][3583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:44.441125 env[1255]: 2025-05-17 00:42:44.435 [INFO][3569] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:42:44.443799 systemd[1]: run-netns-cni\x2d93757c48\x2d401b\x2defe7\x2d3ee4\x2d4cad66ed6627.mount: Deactivated successfully. May 17 00:42:44.444749 env[1255]: time="2025-05-17T00:42:44.444724521Z" level=info msg="TearDown network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" successfully" May 17 00:42:44.444822 env[1255]: time="2025-05-17T00:42:44.444810432Z" level=info msg="StopPodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" returns successfully" May 17 00:42:44.445248 env[1255]: time="2025-05-17T00:42:44.445234071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-56l6r,Uid:8dc7f54e-cda6-468d-b616-716c37ee92f8,Namespace:kube-system,Attempt:1,}" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.403 [INFO][3570] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.403 [INFO][3570] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" iface="eth0" netns="/var/run/netns/cni-bc3272c2-4cff-4244-b544-1c3a304f0085" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.403 [INFO][3570] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" iface="eth0" netns="/var/run/netns/cni-bc3272c2-4cff-4244-b544-1c3a304f0085" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.403 [INFO][3570] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" iface="eth0" netns="/var/run/netns/cni-bc3272c2-4cff-4244-b544-1c3a304f0085" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.403 [INFO][3570] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.403 [INFO][3570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.435 [INFO][3585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.435 [INFO][3585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.435 [INFO][3585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.440 [WARNING][3585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.440 [INFO][3585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.442 [INFO][3585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:44.447622 env[1255]: 2025-05-17 00:42:44.446 [INFO][3570] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:42:44.450095 env[1255]: time="2025-05-17T00:42:44.449053305Z" level=info msg="TearDown network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" successfully" May 17 00:42:44.450095 env[1255]: time="2025-05-17T00:42:44.449069827Z" level=info msg="StopPodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" returns successfully" May 17 00:42:44.449023 systemd[1]: run-netns-cni\x2dbc3272c2\x2d4cff\x2d4244\x2db544\x2d1c3a304f0085.mount: Deactivated successfully. May 17 00:42:44.458744 env[1255]: time="2025-05-17T00:42:44.450242410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-j7l42,Uid:2999001c-b44d-4ddb-8117-53b580949709,Namespace:calico-apiserver,Attempt:1,}" May 17 00:42:44.618113 systemd-networkd[1066]: cali844e89bb94c: Link UP May 17 00:42:44.620748 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:44.620787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali844e89bb94c: link becomes ready May 17 00:42:44.620676 systemd-networkd[1066]: cali844e89bb94c: Gained carrier May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.523 [INFO][3597] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.533 [INFO][3597] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0 calico-apiserver-75dcd5ccd6- calico-apiserver 2999001c-b44d-4ddb-8117-53b580949709 915 0 2025-05-17 00:42:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75dcd5ccd6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-75dcd5ccd6-j7l42 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali844e89bb94c [] [] }} ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.533 [INFO][3597] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.577 [INFO][3630] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" HandleID="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.577 [INFO][3630] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" HandleID="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-75dcd5ccd6-j7l42", "timestamp":"2025-05-17 00:42:44.577890317 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.578 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.578 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.578 [INFO][3630] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.591 [INFO][3630] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.594 [INFO][3630] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.599 [INFO][3630] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.601 [INFO][3630] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.602 [INFO][3630] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.602 [INFO][3630] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.603 [INFO][3630] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84 May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.607 [INFO][3630] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.611 [INFO][3630] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.611 [INFO][3630] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" host="localhost" May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.611 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:44.634794 env[1255]: 2025-05-17 00:42:44.611 [INFO][3630] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" HandleID="k8s-pod-network.2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.637944 env[1255]: 2025-05-17 00:42:44.613 [INFO][3597] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"2999001c-b44d-4ddb-8117-53b580949709", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-75dcd5ccd6-j7l42", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali844e89bb94c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:44.637944 env[1255]: 2025-05-17 00:42:44.613 [INFO][3597] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.637944 env[1255]: 2025-05-17 00:42:44.613 [INFO][3597] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali844e89bb94c ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.637944 env[1255]: 2025-05-17 00:42:44.621 [INFO][3597] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.637944 env[1255]: 2025-05-17 00:42:44.622 [INFO][3597] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"2999001c-b44d-4ddb-8117-53b580949709", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84", Pod:"calico-apiserver-75dcd5ccd6-j7l42", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali844e89bb94c", MAC:"12:f2:0a:5e:e7:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:44.637944 env[1255]: 2025-05-17 00:42:44.629 [INFO][3597] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-j7l42" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:42:44.648254 env[1255]: time="2025-05-17T00:42:44.648209618Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:44.648254 env[1255]: time="2025-05-17T00:42:44.648233371Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:44.648424 env[1255]: time="2025-05-17T00:42:44.648242518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:44.648552 env[1255]: time="2025-05-17T00:42:44.648526941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84 pid=3675 runtime=io.containerd.runc.v2 May 17 00:42:44.661316 systemd[1]: Started cri-containerd-2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84.scope. May 17 00:42:44.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.673993 kernel: kauditd_printk_skb: 131 callbacks suppressed May 17 00:42:44.674472 kernel: audit: type=1400 audit(1747442564.671:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.678640 kernel: audit: type=1400 audit(1747442564.671:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.680985 kernel: audit: type=1400 audit(1747442564.671:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.683447 kernel: audit: type=1400 audit(1747442564.671:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.683487 kernel: audit: type=1400 audit(1747442564.671:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.688862 kernel: audit: type=1400 audit(1747442564.671:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.690735 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:44.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.696406 kernel: audit: type=1400 audit(1747442564.671:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.696453 kernel: audit: type=1400 audit(1747442564.671:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.699403 kernel: audit: type=1400 audit(1747442564.671:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.699478 kernel: audit: type=1400 audit(1747442564.671:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.671000 audit: BPF prog-id=140 op=LOAD May 17 00:42:44.676000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3675 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262343566373536383737646237386630643634633666303162323562 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3675 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262343566373536383737646237386630643634633666303162323562 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.676000 audit: BPF prog-id=141 op=LOAD May 17 00:42:44.676000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000332a00 items=0 ppid=3675 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262343566373536383737646237386630643634633666303162323562 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.679000 audit: BPF prog-id=142 op=LOAD May 17 00:42:44.679000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000332a48 items=0 ppid=3675 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262343566373536383737646237386630643634633666303162323562 May 17 00:42:44.684000 audit: BPF prog-id=142 op=UNLOAD May 17 00:42:44.684000 audit: BPF prog-id=141 op=UNLOAD May 17 00:42:44.684000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.684000 audit: BPF prog-id=143 op=LOAD May 17 00:42:44.684000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000332e58 items=0 ppid=3675 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262343566373536383737646237386630643634633666303162323562 May 17 00:42:44.717801 systemd-networkd[1066]: cali468858dba40: Link UP May 17 00:42:44.719729 systemd-networkd[1066]: cali468858dba40: Gained carrier May 17 00:42:44.720391 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali468858dba40: link becomes ready May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.545 [INFO][3601] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.552 [INFO][3601] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--56l6r-eth0 coredns-674b8bbfcf- kube-system 8dc7f54e-cda6-468d-b616-716c37ee92f8 914 0 2025-05-17 00:42:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-56l6r eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali468858dba40 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.552 [INFO][3601] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.603 [INFO][3648] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" HandleID="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.604 [INFO][3648] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" HandleID="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9630), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-56l6r", "timestamp":"2025-05-17 00:42:44.603598991 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.604 [INFO][3648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.611 [INFO][3648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.611 [INFO][3648] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.689 [INFO][3648] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.703 [INFO][3648] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.706 [INFO][3648] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.707 [INFO][3648] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.708 [INFO][3648] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.708 [INFO][3648] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.709 [INFO][3648] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1 May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.711 [INFO][3648] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.714 [INFO][3648] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.714 [INFO][3648] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" host="localhost" May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.714 [INFO][3648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:44.730394 env[1255]: 2025-05-17 00:42:44.714 [INFO][3648] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" HandleID="k8s-pod-network.c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.730961 env[1255]: 2025-05-17 00:42:44.716 [INFO][3601] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--56l6r-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"8dc7f54e-cda6-468d-b616-716c37ee92f8", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-56l6r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali468858dba40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:44.730961 env[1255]: 2025-05-17 00:42:44.716 [INFO][3601] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.730961 env[1255]: 2025-05-17 00:42:44.716 [INFO][3601] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali468858dba40 ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.730961 env[1255]: 2025-05-17 00:42:44.718 [INFO][3601] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.730961 env[1255]: 2025-05-17 00:42:44.720 [INFO][3601] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--56l6r-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"8dc7f54e-cda6-468d-b616-716c37ee92f8", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1", Pod:"coredns-674b8bbfcf-56l6r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali468858dba40", MAC:"32:29:2b:19:bb:e2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:44.730961 env[1255]: 2025-05-17 00:42:44.728 [INFO][3601] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1" Namespace="kube-system" Pod="coredns-674b8bbfcf-56l6r" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:42:44.739093 env[1255]: time="2025-05-17T00:42:44.739058322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-j7l42,Uid:2999001c-b44d-4ddb-8117-53b580949709,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84\"" May 17 00:42:44.741160 env[1255]: time="2025-05-17T00:42:44.741137229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:42:44.745342 env[1255]: time="2025-05-17T00:42:44.745295983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:44.745446 env[1255]: time="2025-05-17T00:42:44.745327013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:44.745446 env[1255]: time="2025-05-17T00:42:44.745343272Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:44.745576 env[1255]: time="2025-05-17T00:42:44.745545986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1 pid=3736 runtime=io.containerd.runc.v2 May 17 00:42:44.752830 systemd[1]: Started cri-containerd-c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1.scope. May 17 00:42:44.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.771000 audit: BPF prog-id=144 op=LOAD May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3736 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396537626466393837653932313834666131303966363266333565 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3736 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396537626466393837653932313834666131303966363266333565 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit: BPF prog-id=145 op=LOAD May 17 00:42:44.772000 audit[3746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00025dce0 items=0 ppid=3736 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396537626466393837653932313834666131303966363266333565 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit: BPF prog-id=146 op=LOAD May 17 00:42:44.772000 audit[3746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00025dd28 items=0 ppid=3736 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396537626466393837653932313834666131303966363266333565 May 17 00:42:44.772000 audit: BPF prog-id=146 op=UNLOAD May 17 00:42:44.772000 audit: BPF prog-id=145 op=UNLOAD May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { perfmon } for pid=3746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit[3746]: AVC avc: denied { bpf } for pid=3746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.772000 audit: BPF prog-id=147 op=LOAD May 17 00:42:44.772000 audit[3746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003de138 items=0 ppid=3736 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396537626466393837653932313834666131303966363266333565 May 17 00:42:44.774630 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:44.799957 env[1255]: time="2025-05-17T00:42:44.799921538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-56l6r,Uid:8dc7f54e-cda6-468d-b616-716c37ee92f8,Namespace:kube-system,Attempt:1,} returns sandbox id \"c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1\"" May 17 00:42:44.803873 env[1255]: time="2025-05-17T00:42:44.803848247Z" level=info msg="CreateContainer within sandbox \"c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:42:44.813038 env[1255]: time="2025-05-17T00:42:44.813016728Z" level=info msg="CreateContainer within sandbox \"c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e98ca4459c6771fb76799d8ce2fcf304da9feb92fd6ef08cd70ec46b626cfab1\"" May 17 00:42:44.814292 env[1255]: time="2025-05-17T00:42:44.814272237Z" level=info msg="StartContainer for \"e98ca4459c6771fb76799d8ce2fcf304da9feb92fd6ef08cd70ec46b626cfab1\"" May 17 00:42:44.823905 systemd[1]: Started cri-containerd-e98ca4459c6771fb76799d8ce2fcf304da9feb92fd6ef08cd70ec46b626cfab1.scope. May 17 00:42:44.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.835000 audit: BPF prog-id=148 op=LOAD May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3736 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386361343435396336373731666237363739396438636532666366 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3736 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386361343435396336373731666237363739396438636532666366 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit: BPF prog-id=149 op=LOAD May 17 00:42:44.836000 audit[3776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000337d70 items=0 ppid=3736 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386361343435396336373731666237363739396438636532666366 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.836000 audit: BPF prog-id=150 op=LOAD May 17 00:42:44.836000 audit[3776]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000337db8 items=0 ppid=3736 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386361343435396336373731666237363739396438636532666366 May 17 00:42:44.836000 audit: BPF prog-id=150 op=UNLOAD May 17 00:42:44.836000 audit: BPF prog-id=149 op=UNLOAD May 17 00:42:44.837000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { perfmon } for pid=3776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit[3776]: AVC avc: denied { bpf } for pid=3776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:44.837000 audit: BPF prog-id=151 op=LOAD May 17 00:42:44.837000 audit[3776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00037c1c8 items=0 ppid=3736 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:44.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386361343435396336373731666237363739396438636532666366 May 17 00:42:44.848857 env[1255]: time="2025-05-17T00:42:44.848829052Z" level=info msg="StartContainer for \"e98ca4459c6771fb76799d8ce2fcf304da9feb92fd6ef08cd70ec46b626cfab1\" returns successfully" May 17 00:42:45.028000 audit[3787]: AVC avc: denied { getattr } for pid=3787 comm="coredns" path="cgroup:[4026533060]" dev="nsfs" ino=4026533060 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c647 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:42:45.028000 audit[3787]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aaf8 a2=c00049b558 a3=0 items=0 ppid=3736 pid=3787 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c647 key=(null) May 17 00:42:45.028000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:42:45.313628 env[1255]: time="2025-05-17T00:42:45.313551147Z" level=info msg="StopPodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\"" May 17 00:42:45.313839 env[1255]: time="2025-05-17T00:42:45.313814942Z" level=info msg="StopPodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\"" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.360 [INFO][3843] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.361 [INFO][3843] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" iface="eth0" netns="/var/run/netns/cni-a6eb3cc8-9a50-ad2a-0282-40cef74dd3fe" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.361 [INFO][3843] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" iface="eth0" netns="/var/run/netns/cni-a6eb3cc8-9a50-ad2a-0282-40cef74dd3fe" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.361 [INFO][3843] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" iface="eth0" netns="/var/run/netns/cni-a6eb3cc8-9a50-ad2a-0282-40cef74dd3fe" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.361 [INFO][3843] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.361 [INFO][3843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.381 [INFO][3855] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.381 [INFO][3855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.381 [INFO][3855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.388 [WARNING][3855] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.388 [INFO][3855] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.389 [INFO][3855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:45.391929 env[1255]: 2025-05-17 00:42:45.390 [INFO][3843] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:42:45.392617 env[1255]: time="2025-05-17T00:42:45.392364496Z" level=info msg="TearDown network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" successfully" May 17 00:42:45.392617 env[1255]: time="2025-05-17T00:42:45.392393598Z" level=info msg="StopPodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" returns successfully" May 17 00:42:45.393080 env[1255]: time="2025-05-17T00:42:45.393066061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-plw7j,Uid:8871d705-da6a-40f6-bbd3-3e5f159b36d3,Namespace:calico-apiserver,Attempt:1,}" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.368 [INFO][3842] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.368 [INFO][3842] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" iface="eth0" netns="/var/run/netns/cni-0c6a606f-131d-6616-04b6-543281f5ee92" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.368 [INFO][3842] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" iface="eth0" netns="/var/run/netns/cni-0c6a606f-131d-6616-04b6-543281f5ee92" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.368 [INFO][3842] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" iface="eth0" netns="/var/run/netns/cni-0c6a606f-131d-6616-04b6-543281f5ee92" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.368 [INFO][3842] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.368 [INFO][3842] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.398 [INFO][3861] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.398 [INFO][3861] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.398 [INFO][3861] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.408 [WARNING][3861] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.408 [INFO][3861] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.409 [INFO][3861] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:45.412066 env[1255]: 2025-05-17 00:42:45.410 [INFO][3842] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:42:45.412491 env[1255]: time="2025-05-17T00:42:45.412460885Z" level=info msg="TearDown network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" successfully" May 17 00:42:45.412491 env[1255]: time="2025-05-17T00:42:45.412484521Z" level=info msg="StopPodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" returns successfully" May 17 00:42:45.412998 env[1255]: time="2025-05-17T00:42:45.412982179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mckdw,Uid:d90242e4-0770-4c57-b411-99b69c529708,Namespace:calico-system,Attempt:1,}" May 17 00:42:45.446387 systemd[1]: run-netns-cni\x2da6eb3cc8\x2d9a50\x2dad2a\x2d0282\x2d40cef74dd3fe.mount: Deactivated successfully. May 17 00:42:45.446447 systemd[1]: run-netns-cni\x2d0c6a606f\x2d131d\x2d6616\x2d04b6\x2d543281f5ee92.mount: Deactivated successfully. May 17 00:42:45.471023 kubelet[2126]: I0517 00:42:45.469365 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-56l6r" podStartSLOduration=36.469351609 podStartE2EDuration="36.469351609s" podCreationTimestamp="2025-05-17 00:42:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:45.45920933 +0000 UTC m=+40.474790534" watchObservedRunningTime="2025-05-17 00:42:45.469351609 +0000 UTC m=+40.484932815" May 17 00:42:45.484000 audit[3899]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:45.484000 audit[3899]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffde8d98380 a2=0 a3=7ffde8d9836c items=0 ppid=2280 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:45.489000 audit[3899]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:45.489000 audit[3899]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde8d98380 a2=0 a3=0 items=0 ppid=2280 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:45.505464 systemd-networkd[1066]: calicce868cbf21: Link UP May 17 00:42:45.506401 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicce868cbf21: link becomes ready May 17 00:42:45.506474 systemd-networkd[1066]: calicce868cbf21: Gained carrier May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.428 [INFO][3867] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.437 [INFO][3867] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0 calico-apiserver-75dcd5ccd6- calico-apiserver 8871d705-da6a-40f6-bbd3-3e5f159b36d3 932 0 2025-05-17 00:42:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75dcd5ccd6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-75dcd5ccd6-plw7j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicce868cbf21 [] [] }} ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.437 [INFO][3867] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.472 [INFO][3892] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" HandleID="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.472 [INFO][3892] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" HandleID="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1050), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-75dcd5ccd6-plw7j", "timestamp":"2025-05-17 00:42:45.47200524 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.472 [INFO][3892] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.472 [INFO][3892] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.472 [INFO][3892] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.478 [INFO][3892] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.487 [INFO][3892] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.491 [INFO][3892] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.492 [INFO][3892] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.494 [INFO][3892] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.494 [INFO][3892] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.494 [INFO][3892] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9 May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.497 [INFO][3892] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.501 [INFO][3892] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.501 [INFO][3892] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" host="localhost" May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.501 [INFO][3892] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:45.518455 env[1255]: 2025-05-17 00:42:45.501 [INFO][3892] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" HandleID="k8s-pod-network.741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.518969 env[1255]: 2025-05-17 00:42:45.503 [INFO][3867] cni-plugin/k8s.go 418: Populated endpoint ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"8871d705-da6a-40f6-bbd3-3e5f159b36d3", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-75dcd5ccd6-plw7j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicce868cbf21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:45.518969 env[1255]: 2025-05-17 00:42:45.503 [INFO][3867] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.518969 env[1255]: 2025-05-17 00:42:45.503 [INFO][3867] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicce868cbf21 ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.518969 env[1255]: 2025-05-17 00:42:45.507 [INFO][3867] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.518969 env[1255]: 2025-05-17 00:42:45.507 [INFO][3867] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"8871d705-da6a-40f6-bbd3-3e5f159b36d3", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9", Pod:"calico-apiserver-75dcd5ccd6-plw7j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicce868cbf21", MAC:"a2:42:3c:b2:1f:0f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:45.518969 env[1255]: 2025-05-17 00:42:45.514 [INFO][3867] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9" Namespace="calico-apiserver" Pod="calico-apiserver-75dcd5ccd6-plw7j" WorkloadEndpoint="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:42:45.523000 audit[3917]: NETFILTER_CFG table=filter:101 family=2 entries=19 op=nft_register_rule pid=3917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:45.523000 audit[3917]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffebef7a6f0 a2=0 a3=7ffebef7a6dc items=0 ppid=2280 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:45.527000 audit[3917]: NETFILTER_CFG table=nat:102 family=2 entries=33 op=nft_register_chain pid=3917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:45.527000 audit[3917]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffebef7a6f0 a2=0 a3=7ffebef7a6dc items=0 ppid=2280 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:45.531453 env[1255]: time="2025-05-17T00:42:45.531326995Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:45.531453 env[1255]: time="2025-05-17T00:42:45.531350136Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:45.531453 env[1255]: time="2025-05-17T00:42:45.531359322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:45.531543 env[1255]: time="2025-05-17T00:42:45.531467680Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9 pid=3926 runtime=io.containerd.runc.v2 May 17 00:42:45.548145 systemd[1]: Started cri-containerd-741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9.scope. May 17 00:42:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit: BPF prog-id=152 op=LOAD May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3926 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313138353636366639383930646463326466363337346232623437 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3926 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313138353636366639383930646463326466363337346232623437 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit: BPF prog-id=153 op=LOAD May 17 00:42:45.555000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003f2000 items=0 ppid=3926 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313138353636366639383930646463326466363337346232623437 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit: BPF prog-id=154 op=LOAD May 17 00:42:45.555000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003f2048 items=0 ppid=3926 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313138353636366639383930646463326466363337346232623437 May 17 00:42:45.555000 audit: BPF prog-id=154 op=UNLOAD May 17 00:42:45.555000 audit: BPF prog-id=153 op=UNLOAD May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { perfmon } for pid=3934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit[3934]: AVC avc: denied { bpf } for pid=3934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.555000 audit: BPF prog-id=155 op=LOAD May 17 00:42:45.555000 audit[3934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003f2458 items=0 ppid=3926 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313138353636366639383930646463326466363337346232623437 May 17 00:42:45.557568 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:45.579399 env[1255]: time="2025-05-17T00:42:45.577211814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75dcd5ccd6-plw7j,Uid:8871d705-da6a-40f6-bbd3-3e5f159b36d3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9\"" May 17 00:42:45.608428 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a39201a64e: link becomes ready May 17 00:42:45.608006 systemd-networkd[1066]: cali2a39201a64e: Link UP May 17 00:42:45.608105 systemd-networkd[1066]: cali2a39201a64e: Gained carrier May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.467 [INFO][3879] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.479 [INFO][3879] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--mckdw-eth0 csi-node-driver- calico-system d90242e4-0770-4c57-b411-99b69c529708 933 0 2025-05-17 00:42:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-mckdw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2a39201a64e [] [] }} ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.479 [INFO][3879] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.522 [INFO][3902] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" HandleID="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.522 [INFO][3902] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" HandleID="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d90d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-mckdw", "timestamp":"2025-05-17 00:42:45.522599235 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.522 [INFO][3902] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.522 [INFO][3902] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.522 [INFO][3902] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.580 [INFO][3902] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.587 [INFO][3902] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.591 [INFO][3902] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.593 [INFO][3902] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.594 [INFO][3902] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.594 [INFO][3902] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.595 [INFO][3902] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50 May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.600 [INFO][3902] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.604 [INFO][3902] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.604 [INFO][3902] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" host="localhost" May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.604 [INFO][3902] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:45.619318 env[1255]: 2025-05-17 00:42:45.604 [INFO][3902] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" HandleID="k8s-pod-network.14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.619812 env[1255]: 2025-05-17 00:42:45.605 [INFO][3879] cni-plugin/k8s.go 418: Populated endpoint ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mckdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d90242e4-0770-4c57-b411-99b69c529708", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-mckdw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2a39201a64e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:45.619812 env[1255]: 2025-05-17 00:42:45.605 [INFO][3879] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.619812 env[1255]: 2025-05-17 00:42:45.605 [INFO][3879] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2a39201a64e ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.619812 env[1255]: 2025-05-17 00:42:45.608 [INFO][3879] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.619812 env[1255]: 2025-05-17 00:42:45.609 [INFO][3879] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mckdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d90242e4-0770-4c57-b411-99b69c529708", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50", Pod:"csi-node-driver-mckdw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2a39201a64e", MAC:"9e:59:2b:24:3e:3d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:45.619812 env[1255]: 2025-05-17 00:42:45.618 [INFO][3879] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50" Namespace="calico-system" Pod="csi-node-driver-mckdw" WorkloadEndpoint="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:42:45.627374 env[1255]: time="2025-05-17T00:42:45.627327382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:45.627514 env[1255]: time="2025-05-17T00:42:45.627361594Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:45.627514 env[1255]: time="2025-05-17T00:42:45.627368689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:45.627598 env[1255]: time="2025-05-17T00:42:45.627564974Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50 pid=3974 runtime=io.containerd.runc.v2 May 17 00:42:45.640517 systemd[1]: Started cri-containerd-14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50.scope. May 17 00:42:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit: BPF prog-id=156 op=LOAD May 17 00:42:45.647000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3974 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134656231333461616535383763323861323437633066326464373435 May 17 00:42:45.647000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.647000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3974 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134656231333461616535383763323861323437633066326464373435 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit: BPF prog-id=157 op=LOAD May 17 00:42:45.648000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c1320 items=0 ppid=3974 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134656231333461616535383763323861323437633066326464373435 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit: BPF prog-id=158 op=LOAD May 17 00:42:45.648000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c1368 items=0 ppid=3974 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134656231333461616535383763323861323437633066326464373435 May 17 00:42:45.648000 audit: BPF prog-id=158 op=UNLOAD May 17 00:42:45.648000 audit: BPF prog-id=157 op=UNLOAD May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:45.648000 audit: BPF prog-id=159 op=LOAD May 17 00:42:45.648000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c1778 items=0 ppid=3974 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:45.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134656231333461616535383763323861323437633066326464373435 May 17 00:42:45.650800 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:45.657904 env[1255]: time="2025-05-17T00:42:45.657880099Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mckdw,Uid:d90242e4-0770-4c57-b411-99b69c529708,Namespace:calico-system,Attempt:1,} returns sandbox id \"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50\"" May 17 00:42:46.017466 systemd-networkd[1066]: cali844e89bb94c: Gained IPv6LL May 17 00:42:46.311498 env[1255]: time="2025-05-17T00:42:46.311349702Z" level=info msg="StopPodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\"" May 17 00:42:46.443922 systemd[1]: run-containerd-runc-k8s.io-14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50-runc.kk1yXN.mount: Deactivated successfully. May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.402 [INFO][4029] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.402 [INFO][4029] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" iface="eth0" netns="/var/run/netns/cni-23aed892-3365-4d4a-a299-0b63ca0b1216" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.403 [INFO][4029] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" iface="eth0" netns="/var/run/netns/cni-23aed892-3365-4d4a-a299-0b63ca0b1216" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.403 [INFO][4029] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" iface="eth0" netns="/var/run/netns/cni-23aed892-3365-4d4a-a299-0b63ca0b1216" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.403 [INFO][4029] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.403 [INFO][4029] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.437 [INFO][4041] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.437 [INFO][4041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.437 [INFO][4041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.442 [WARNING][4041] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.442 [INFO][4041] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.444 [INFO][4041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:46.456170 env[1255]: 2025-05-17 00:42:46.451 [INFO][4029] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:42:46.458594 env[1255]: time="2025-05-17T00:42:46.457812629Z" level=info msg="TearDown network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" successfully" May 17 00:42:46.458594 env[1255]: time="2025-05-17T00:42:46.457830819Z" level=info msg="StopPodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" returns successfully" May 17 00:42:46.457725 systemd[1]: run-netns-cni\x2d23aed892\x2d3365\x2d4d4a\x2da299\x2d0b63ca0b1216.mount: Deactivated successfully. May 17 00:42:46.458735 env[1255]: time="2025-05-17T00:42:46.458621190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-tlp7m,Uid:31a50143-b38b-436f-9b87-2b078a019036,Namespace:kube-system,Attempt:1,}" May 17 00:42:46.583691 systemd-networkd[1066]: cali19ae9484575: Link UP May 17 00:42:46.585792 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:46.585837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali19ae9484575: link becomes ready May 17 00:42:46.586034 systemd-networkd[1066]: cali19ae9484575: Gained carrier May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.508 [INFO][4050] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.515 [INFO][4050] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0 coredns-674b8bbfcf- kube-system 31a50143-b38b-436f-9b87-2b078a019036 955 0 2025-05-17 00:42:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-tlp7m eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali19ae9484575 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.515 [INFO][4050] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.534 [INFO][4062] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" HandleID="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.535 [INFO][4062] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" HandleID="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b74d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-tlp7m", "timestamp":"2025-05-17 00:42:46.534884278 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.535 [INFO][4062] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.535 [INFO][4062] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.535 [INFO][4062] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.547 [INFO][4062] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.553 [INFO][4062] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.567 [INFO][4062] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.571 [INFO][4062] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.572 [INFO][4062] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.572 [INFO][4062] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.573 [INFO][4062] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.576 [INFO][4062] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.580 [INFO][4062] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.580 [INFO][4062] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" host="localhost" May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.580 [INFO][4062] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:46.599318 env[1255]: 2025-05-17 00:42:46.580 [INFO][4062] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" HandleID="k8s-pod-network.9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.600628 env[1255]: 2025-05-17 00:42:46.581 [INFO][4050] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"31a50143-b38b-436f-9b87-2b078a019036", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-tlp7m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali19ae9484575", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:46.600628 env[1255]: 2025-05-17 00:42:46.581 [INFO][4050] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.600628 env[1255]: 2025-05-17 00:42:46.581 [INFO][4050] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali19ae9484575 ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.600628 env[1255]: 2025-05-17 00:42:46.586 [INFO][4050] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.600628 env[1255]: 2025-05-17 00:42:46.586 [INFO][4050] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"31a50143-b38b-436f-9b87-2b078a019036", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf", Pod:"coredns-674b8bbfcf-tlp7m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali19ae9484575", MAC:"4e:69:3e:40:db:72", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:46.600628 env[1255]: 2025-05-17 00:42:46.593 [INFO][4050] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf" Namespace="kube-system" Pod="coredns-674b8bbfcf-tlp7m" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:42:46.631329 env[1255]: time="2025-05-17T00:42:46.631283905Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:46.631461 env[1255]: time="2025-05-17T00:42:46.631315536Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:46.631461 env[1255]: time="2025-05-17T00:42:46.631322962Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:46.631461 env[1255]: time="2025-05-17T00:42:46.631432933Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf pid=4081 runtime=io.containerd.runc.v2 May 17 00:42:46.650220 systemd[1]: Started cri-containerd-9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf.scope. May 17 00:42:46.657455 systemd-networkd[1066]: cali468858dba40: Gained IPv6LL May 17 00:42:46.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.660000 audit: BPF prog-id=160 op=LOAD May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4081 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935393865343764323237623630303430633434313766623738346666 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4081 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935393865343764323237623630303430633434313766623738346666 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit: BPF prog-id=161 op=LOAD May 17 00:42:46.661000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023f5f0 items=0 ppid=4081 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935393865343764323237623630303430633434313766623738346666 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit: BPF prog-id=162 op=LOAD May 17 00:42:46.661000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023f638 items=0 ppid=4081 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935393865343764323237623630303430633434313766623738346666 May 17 00:42:46.661000 audit: BPF prog-id=162 op=UNLOAD May 17 00:42:46.661000 audit: BPF prog-id=161 op=UNLOAD May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.661000 audit: BPF prog-id=163 op=LOAD May 17 00:42:46.661000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023fa48 items=0 ppid=4081 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935393865343764323237623630303430633434313766623738346666 May 17 00:42:46.663570 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:46.689040 env[1255]: time="2025-05-17T00:42:46.689014977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-tlp7m,Uid:31a50143-b38b-436f-9b87-2b078a019036,Namespace:kube-system,Attempt:1,} returns sandbox id \"9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf\"" May 17 00:42:46.742692 env[1255]: time="2025-05-17T00:42:46.742668764Z" level=info msg="CreateContainer within sandbox \"9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:42:46.818464 env[1255]: time="2025-05-17T00:42:46.818430678Z" level=info msg="CreateContainer within sandbox \"9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3748e0bcc6fa90fa200c2e7c144ad4b353922914d35b60cfd98119b226c263d1\"" May 17 00:42:46.819702 env[1255]: time="2025-05-17T00:42:46.819682888Z" level=info msg="StartContainer for \"3748e0bcc6fa90fa200c2e7c144ad4b353922914d35b60cfd98119b226c263d1\"" May 17 00:42:46.843596 systemd[1]: Started cri-containerd-3748e0bcc6fa90fa200c2e7c144ad4b353922914d35b60cfd98119b226c263d1.scope. May 17 00:42:46.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit: BPF prog-id=164 op=LOAD May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4081 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343865306263633666613930666132303063326537633134346164 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4081 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343865306263633666613930666132303063326537633134346164 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit: BPF prog-id=165 op=LOAD May 17 00:42:46.859000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df0d0 items=0 ppid=4081 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343865306263633666613930666132303063326537633134346164 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit: BPF prog-id=166 op=LOAD May 17 00:42:46.859000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df118 items=0 ppid=4081 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343865306263633666613930666132303063326537633134346164 May 17 00:42:46.859000 audit: BPF prog-id=166 op=UNLOAD May 17 00:42:46.859000 audit: BPF prog-id=165 op=UNLOAD May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:46.859000 audit: BPF prog-id=167 op=LOAD May 17 00:42:46.859000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001df528 items=0 ppid=4081 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:46.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343865306263633666613930666132303063326537633134346164 May 17 00:42:46.893033 env[1255]: time="2025-05-17T00:42:46.893007113Z" level=info msg="StartContainer for \"3748e0bcc6fa90fa200c2e7c144ad4b353922914d35b60cfd98119b226c263d1\" returns successfully" May 17 00:42:46.906000 audit[4133]: AVC avc: denied { getattr } for pid=4133 comm="coredns" path="cgroup:[4026533005]" dev="nsfs" ino=4026533005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c1018 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:42:46.906000 audit[4133]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a810 a2=c0004a3898 a3=0 items=0 ppid=4081 pid=4133 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c1018 key=(null) May 17 00:42:46.906000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:42:47.041456 systemd-networkd[1066]: calicce868cbf21: Gained IPv6LL May 17 00:42:47.313561 env[1255]: time="2025-05-17T00:42:47.313532988Z" level=info msg="StopPodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\"" May 17 00:42:47.355882 env[1255]: time="2025-05-17T00:42:47.355851537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.358997 env[1255]: time="2025-05-17T00:42:47.358976406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.359894 env[1255]: time="2025-05-17T00:42:47.359877570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.361111 env[1255]: time="2025-05-17T00:42:47.361094082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.361896 env[1255]: time="2025-05-17T00:42:47.361528343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:42:47.365982 env[1255]: time="2025-05-17T00:42:47.365946821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:42:47.376174 env[1255]: time="2025-05-17T00:42:47.376146728Z" level=info msg="CreateContainer within sandbox \"2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:42:47.381635 env[1255]: time="2025-05-17T00:42:47.381609709Z" level=info msg="CreateContainer within sandbox \"2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3e39adf278ec571fc06943ff2c5190dac97367b1ac7c8d7bf0e588acce008459\"" May 17 00:42:47.382228 env[1255]: time="2025-05-17T00:42:47.382213922Z" level=info msg="StartContainer for \"3e39adf278ec571fc06943ff2c5190dac97367b1ac7c8d7bf0e588acce008459\"" May 17 00:42:47.401973 systemd[1]: Started cri-containerd-3e39adf278ec571fc06943ff2c5190dac97367b1ac7c8d7bf0e588acce008459.scope. May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.354 [INFO][4163] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.355 [INFO][4163] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" iface="eth0" netns="/var/run/netns/cni-a5205f6a-017a-f1db-f62c-0bb928906d15" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.355 [INFO][4163] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" iface="eth0" netns="/var/run/netns/cni-a5205f6a-017a-f1db-f62c-0bb928906d15" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.359 [INFO][4163] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" iface="eth0" netns="/var/run/netns/cni-a5205f6a-017a-f1db-f62c-0bb928906d15" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.359 [INFO][4163] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.359 [INFO][4163] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.397 [INFO][4172] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.398 [INFO][4172] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.398 [INFO][4172] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.411 [WARNING][4172] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.411 [INFO][4172] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.412 [INFO][4172] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:47.416633 env[1255]: 2025-05-17 00:42:47.414 [INFO][4163] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:42:47.418290 env[1255]: time="2025-05-17T00:42:47.416747786Z" level=info msg="TearDown network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" successfully" May 17 00:42:47.418290 env[1255]: time="2025-05-17T00:42:47.416767092Z" level=info msg="StopPodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" returns successfully" May 17 00:42:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.427000 audit: BPF prog-id=168 op=LOAD May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3675 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333961646632373865633537316663303639343366663263353139 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3675 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333961646632373865633537316663303639343366663263353139 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit: BPF prog-id=169 op=LOAD May 17 00:42:47.428000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002afef0 items=0 ppid=3675 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333961646632373865633537316663303639343366663263353139 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit: BPF prog-id=170 op=LOAD May 17 00:42:47.428000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002aff38 items=0 ppid=3675 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333961646632373865633537316663303639343366663263353139 May 17 00:42:47.428000 audit: BPF prog-id=170 op=UNLOAD May 17 00:42:47.428000 audit: BPF prog-id=169 op=UNLOAD May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.428000 audit: BPF prog-id=171 op=LOAD May 17 00:42:47.428000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002f8348 items=0 ppid=3675 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333961646632373865633537316663303639343366663263353139 May 17 00:42:47.431198 env[1255]: time="2025-05-17T00:42:47.431176756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-779d9bfb7-f5cmw,Uid:a299081f-1077-4b1b-91a0-9abc8b5a40d8,Namespace:calico-system,Attempt:1,}" May 17 00:42:47.445628 systemd[1]: run-netns-cni\x2da5205f6a\x2d017a\x2df1db\x2df62c\x2d0bb928906d15.mount: Deactivated successfully. May 17 00:42:47.503405 env[1255]: time="2025-05-17T00:42:47.503367892Z" level=info msg="StartContainer for \"3e39adf278ec571fc06943ff2c5190dac97367b1ac7c8d7bf0e588acce008459\" returns successfully" May 17 00:42:47.565370 kubelet[2126]: I0517 00:42:47.565280 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-j7l42" podStartSLOduration=26.936492742 podStartE2EDuration="29.559784558s" podCreationTimestamp="2025-05-17 00:42:18 +0000 UTC" firstStartedPulling="2025-05-17 00:42:44.739900869 +0000 UTC m=+39.755482069" lastFinishedPulling="2025-05-17 00:42:47.363192685 +0000 UTC m=+42.378773885" observedRunningTime="2025-05-17 00:42:47.54549076 +0000 UTC m=+42.561071967" watchObservedRunningTime="2025-05-17 00:42:47.559784558 +0000 UTC m=+42.575365765" May 17 00:42:47.581182 systemd-networkd[1066]: calie2a364dd634: Link UP May 17 00:42:47.582742 systemd-networkd[1066]: calie2a364dd634: Gained carrier May 17 00:42:47.583418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie2a364dd634: link becomes ready May 17 00:42:47.588877 kubelet[2126]: I0517 00:42:47.588841 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-tlp7m" podStartSLOduration=38.588828235 podStartE2EDuration="38.588828235s" podCreationTimestamp="2025-05-17 00:42:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:42:47.565388925 +0000 UTC m=+42.580970129" watchObservedRunningTime="2025-05-17 00:42:47.588828235 +0000 UTC m=+42.604409442" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.480 [INFO][4206] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.489 [INFO][4206] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0 calico-kube-controllers-779d9bfb7- calico-system a299081f-1077-4b1b-91a0-9abc8b5a40d8 965 0 2025-05-17 00:42:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:779d9bfb7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-779d9bfb7-f5cmw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calie2a364dd634 [] [] }} ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.489 [INFO][4206] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.526 [INFO][4229] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" HandleID="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.526 [INFO][4229] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" HandleID="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-779d9bfb7-f5cmw", "timestamp":"2025-05-17 00:42:47.525885129 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.527 [INFO][4229] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.527 [INFO][4229] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.527 [INFO][4229] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.534 [INFO][4229] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.539 [INFO][4229] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.544 [INFO][4229] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.547 [INFO][4229] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.557 [INFO][4229] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.558 [INFO][4229] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.560 [INFO][4229] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.564 [INFO][4229] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.570 [INFO][4229] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.570 [INFO][4229] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" host="localhost" May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.570 [INFO][4229] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:47.592482 env[1255]: 2025-05-17 00:42:47.570 [INFO][4229] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" HandleID="k8s-pod-network.f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.592972 env[1255]: 2025-05-17 00:42:47.572 [INFO][4206] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0", GenerateName:"calico-kube-controllers-779d9bfb7-", Namespace:"calico-system", SelfLink:"", UID:"a299081f-1077-4b1b-91a0-9abc8b5a40d8", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"779d9bfb7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-779d9bfb7-f5cmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie2a364dd634", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:47.592972 env[1255]: 2025-05-17 00:42:47.572 [INFO][4206] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.592972 env[1255]: 2025-05-17 00:42:47.572 [INFO][4206] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie2a364dd634 ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.592972 env[1255]: 2025-05-17 00:42:47.583 [INFO][4206] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.592972 env[1255]: 2025-05-17 00:42:47.583 [INFO][4206] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0", GenerateName:"calico-kube-controllers-779d9bfb7-", Namespace:"calico-system", SelfLink:"", UID:"a299081f-1077-4b1b-91a0-9abc8b5a40d8", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"779d9bfb7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af", Pod:"calico-kube-controllers-779d9bfb7-f5cmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie2a364dd634", MAC:"9a:67:ac:81:05:64", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:47.592972 env[1255]: 2025-05-17 00:42:47.589 [INFO][4206] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af" Namespace="calico-system" Pod="calico-kube-controllers-779d9bfb7-f5cmw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:42:47.596000 audit[4247]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:47.596000 audit[4247]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef1268aa0 a2=0 a3=7ffef1268a8c items=0 ppid=2280 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:47.604000 audit[4247]: NETFILTER_CFG table=nat:104 family=2 entries=18 op=nft_register_rule pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:47.604000 audit[4247]: SYSCALL arch=c000003e syscall=46 success=yes exit=5004 a0=3 a1=7ffef1268aa0 a2=0 a3=0 items=0 ppid=2280 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:47.608121 env[1255]: time="2025-05-17T00:42:47.608086899Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:47.608205 env[1255]: time="2025-05-17T00:42:47.608190522Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:47.608597 env[1255]: time="2025-05-17T00:42:47.608254475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:47.608597 env[1255]: time="2025-05-17T00:42:47.608355570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af pid=4260 runtime=io.containerd.runc.v2 May 17 00:42:47.616000 audit[4274]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:47.616000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd8731c680 a2=0 a3=7ffd8731c66c items=0 ppid=2280 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:47.617446 systemd-networkd[1066]: cali2a39201a64e: Gained IPv6LL May 17 00:42:47.627832 systemd[1]: run-containerd-runc-k8s.io-f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af-runc.VtvcID.mount: Deactivated successfully. May 17 00:42:47.634737 systemd[1]: Started cri-containerd-f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af.scope. May 17 00:42:47.647000 audit[4274]: NETFILTER_CFG table=nat:106 family=2 entries=54 op=nft_register_chain pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:47.647000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=19092 a0=3 a1=7ffd8731c680 a2=0 a3=7ffd8731c66c items=0 ppid=2280 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:47.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.650000 audit: BPF prog-id=172 op=LOAD May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343339663261373632336365636130653262326235336635646334 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343339663261373632336365636130653262326235336635646334 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit: BPF prog-id=173 op=LOAD May 17 00:42:47.651000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d0650 items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343339663261373632336365636130653262326235336635646334 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit: BPF prog-id=174 op=LOAD May 17 00:42:47.651000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d0698 items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343339663261373632336365636130653262326235336635646334 May 17 00:42:47.651000 audit: BPF prog-id=174 op=UNLOAD May 17 00:42:47.651000 audit: BPF prog-id=173 op=UNLOAD May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.651000 audit: BPF prog-id=175 op=LOAD May 17 00:42:47.651000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d0aa8 items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343339663261373632336365636130653262326235336635646334 May 17 00:42:47.653830 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:47.684552 env[1255]: time="2025-05-17T00:42:47.684518835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-779d9bfb7-f5cmw,Uid:a299081f-1077-4b1b-91a0-9abc8b5a40d8,Namespace:calico-system,Attempt:1,} returns sandbox id \"f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af\"" May 17 00:42:47.718391 env[1255]: time="2025-05-17T00:42:47.718353504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.718948 env[1255]: time="2025-05-17T00:42:47.718932152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.719972 env[1255]: time="2025-05-17T00:42:47.719956679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.720754 env[1255]: time="2025-05-17T00:42:47.720738544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:47.720882 env[1255]: time="2025-05-17T00:42:47.720862494Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:42:47.721920 env[1255]: time="2025-05-17T00:42:47.721878334Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:42:47.723654 env[1255]: time="2025-05-17T00:42:47.723629694Z" level=info msg="CreateContainer within sandbox \"741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:42:47.729525 env[1255]: time="2025-05-17T00:42:47.729507261Z" level=info msg="CreateContainer within sandbox \"741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"661d476da21f63b2d9e3776822e33ea5e2ecf3b50d102be49fd3af7f76ceecfe\"" May 17 00:42:47.729823 env[1255]: time="2025-05-17T00:42:47.729798179Z" level=info msg="StartContainer for \"661d476da21f63b2d9e3776822e33ea5e2ecf3b50d102be49fd3af7f76ceecfe\"" May 17 00:42:47.739354 systemd[1]: Started cri-containerd-661d476da21f63b2d9e3776822e33ea5e2ecf3b50d102be49fd3af7f76ceecfe.scope. May 17 00:42:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.750000 audit: BPF prog-id=176 op=LOAD May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3926 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316434373664613231663633623264396533373736383232653333 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3926 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316434373664613231663633623264396533373736383232653333 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit: BPF prog-id=177 op=LOAD May 17 00:42:47.751000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ba20 items=0 ppid=3926 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316434373664613231663633623264396533373736383232653333 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit: BPF prog-id=178 op=LOAD May 17 00:42:47.751000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ba68 items=0 ppid=3926 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316434373664613231663633623264396533373736383232653333 May 17 00:42:47.751000 audit: BPF prog-id=178 op=UNLOAD May 17 00:42:47.751000 audit: BPF prog-id=177 op=UNLOAD May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:47.751000 audit: BPF prog-id=179 op=LOAD May 17 00:42:47.751000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032be78 items=0 ppid=3926 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316434373664613231663633623264396533373736383232653333 May 17 00:42:47.773566 env[1255]: time="2025-05-17T00:42:47.773541282Z" level=info msg="StartContainer for \"661d476da21f63b2d9e3776822e33ea5e2ecf3b50d102be49fd3af7f76ceecfe\" returns successfully" May 17 00:42:48.002522 systemd-networkd[1066]: cali19ae9484575: Gained IPv6LL May 17 00:42:48.340889 env[1255]: time="2025-05-17T00:42:48.340814884Z" level=info msg="StopPodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\"" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.376 [INFO][4354] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.376 [INFO][4354] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" iface="eth0" netns="/var/run/netns/cni-1e929884-b2e8-7cb4-593a-7d46e88e7995" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.376 [INFO][4354] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" iface="eth0" netns="/var/run/netns/cni-1e929884-b2e8-7cb4-593a-7d46e88e7995" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.376 [INFO][4354] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" iface="eth0" netns="/var/run/netns/cni-1e929884-b2e8-7cb4-593a-7d46e88e7995" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.376 [INFO][4354] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.376 [INFO][4354] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.414 [INFO][4361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.415 [INFO][4361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.415 [INFO][4361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.436 [WARNING][4361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.436 [INFO][4361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.437 [INFO][4361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:48.440524 env[1255]: 2025-05-17 00:42:48.439 [INFO][4354] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:42:48.440936 env[1255]: time="2025-05-17T00:42:48.440649645Z" level=info msg="TearDown network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" successfully" May 17 00:42:48.440936 env[1255]: time="2025-05-17T00:42:48.440671765Z" level=info msg="StopPodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" returns successfully" May 17 00:42:48.444547 systemd[1]: run-netns-cni\x2d1e929884\x2db2e8\x2d7cb4\x2d593a\x2d7d46e88e7995.mount: Deactivated successfully. May 17 00:42:48.447686 env[1255]: time="2025-05-17T00:42:48.447663679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nwrcr,Uid:53e1d52b-66eb-4d04-b85e-c5d1304df65c,Namespace:calico-system,Attempt:1,}" May 17 00:42:48.590184 kubelet[2126]: I0517 00:42:48.590153 2126 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:48.595001 kubelet[2126]: I0517 00:42:48.594627 2126 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:48.599391 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:48.601295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali993d595b7cf: link becomes ready May 17 00:42:48.599663 systemd-networkd[1066]: cali993d595b7cf: Link UP May 17 00:42:48.599975 systemd-networkd[1066]: cali993d595b7cf: Gained carrier May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.480 [INFO][4367] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.493 [INFO][4367] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0 goldmane-78d55f7ddc- calico-system 53e1d52b-66eb-4d04-b85e-c5d1304df65c 986 0 2025-05-17 00:42:20 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-78d55f7ddc-nwrcr eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali993d595b7cf [] [] }} ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.493 [INFO][4367] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.535 [INFO][4380] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" HandleID="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.535 [INFO][4380] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" HandleID="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002356d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-78d55f7ddc-nwrcr", "timestamp":"2025-05-17 00:42:48.5350286 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.535 [INFO][4380] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.535 [INFO][4380] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.535 [INFO][4380] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.545 [INFO][4380] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.557 [INFO][4380] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.563 [INFO][4380] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.565 [INFO][4380] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.571 [INFO][4380] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.572 [INFO][4380] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.575 [INFO][4380] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.586 [INFO][4380] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.592 [INFO][4380] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.592 [INFO][4380] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" host="localhost" May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.593 [INFO][4380] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:48.615691 env[1255]: 2025-05-17 00:42:48.593 [INFO][4380] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" HandleID="k8s-pod-network.f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.617826 env[1255]: 2025-05-17 00:42:48.595 [INFO][4367] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"53e1d52b-66eb-4d04-b85e-c5d1304df65c", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-78d55f7ddc-nwrcr", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali993d595b7cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:48.617826 env[1255]: 2025-05-17 00:42:48.595 [INFO][4367] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.617826 env[1255]: 2025-05-17 00:42:48.595 [INFO][4367] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali993d595b7cf ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.617826 env[1255]: 2025-05-17 00:42:48.604 [INFO][4367] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.617826 env[1255]: 2025-05-17 00:42:48.604 [INFO][4367] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"53e1d52b-66eb-4d04-b85e-c5d1304df65c", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e", Pod:"goldmane-78d55f7ddc-nwrcr", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali993d595b7cf", MAC:"ba:04:83:9e:11:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:48.617826 env[1255]: 2025-05-17 00:42:48.613 [INFO][4367] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nwrcr" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:42:48.627238 env[1255]: time="2025-05-17T00:42:48.627032458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:48.627361 env[1255]: time="2025-05-17T00:42:48.627346932Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:48.627988 env[1255]: time="2025-05-17T00:42:48.627455562Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:48.629138 env[1255]: time="2025-05-17T00:42:48.627719807Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e pid=4410 runtime=io.containerd.runc.v2 May 17 00:42:48.664046 systemd[1]: Started cri-containerd-f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e.scope. May 17 00:42:48.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit: BPF prog-id=180 op=LOAD May 17 00:42:48.673000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4410 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634376334646565343730653861646239323333396364643862356339 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4410 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634376334646565343730653861646239323333396364643862356339 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.673000 audit: BPF prog-id=181 op=LOAD May 17 00:42:48.673000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a3a60 items=0 ppid=4410 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634376334646565343730653861646239323333396364643862356339 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit: BPF prog-id=182 op=LOAD May 17 00:42:48.674000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a3aa8 items=0 ppid=4410 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634376334646565343730653861646239323333396364643862356339 May 17 00:42:48.674000 audit: BPF prog-id=182 op=UNLOAD May 17 00:42:48.674000 audit: BPF prog-id=181 op=UNLOAD May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:48.674000 audit: BPF prog-id=183 op=LOAD May 17 00:42:48.674000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a3eb8 items=0 ppid=4410 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634376334646565343730653861646239323333396364643862356339 May 17 00:42:48.676000 audit[4437]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:48.676000 audit[4437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc68c6e890 a2=0 a3=7ffc68c6e87c items=0 ppid=2280 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:48.683642 systemd-resolved[1208]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:48.684000 audit[4437]: NETFILTER_CFG table=nat:108 family=2 entries=18 op=nft_register_rule pid=4437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:48.684000 audit[4437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5004 a0=3 a1=7ffc68c6e890 a2=0 a3=0 items=0 ppid=2280 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:48.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:48.742865 env[1255]: time="2025-05-17T00:42:48.742834409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nwrcr,Uid:53e1d52b-66eb-4d04-b85e-c5d1304df65c,Namespace:calico-system,Attempt:1,} returns sandbox id \"f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e\"" May 17 00:42:48.772684 kubelet[2126]: I0517 00:42:48.770079 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75dcd5ccd6-plw7j" podStartSLOduration=28.616836321 podStartE2EDuration="30.756725786s" podCreationTimestamp="2025-05-17 00:42:18 +0000 UTC" firstStartedPulling="2025-05-17 00:42:45.581635906 +0000 UTC m=+40.597217106" lastFinishedPulling="2025-05-17 00:42:47.721525371 +0000 UTC m=+42.737106571" observedRunningTime="2025-05-17 00:42:48.655712164 +0000 UTC m=+43.671293370" watchObservedRunningTime="2025-05-17 00:42:48.756725786 +0000 UTC m=+43.772306994" May 17 00:42:48.825000 audit[4199]: AVC avc: denied { watch } for pid=4199 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.380524143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c314,c791 tclass=file permissive=0 May 17 00:42:48.825000 audit[4199]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a9a260 a2=fc6 a3=0 items=0 ppid=3675 pid=4199 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 key=(null) May 17 00:42:48.825000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:42:48.995000 audit[4323]: AVC avc: denied { watch } for pid=4323 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.1919281206/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c442,c969 tclass=file permissive=0 May 17 00:42:48.995000 audit[4323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d18420 a2=fc6 a3=0 items=0 ppid=3926 pid=4323 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 key=(null) May 17 00:42:48.995000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:42:49.446646 systemd[1]: run-containerd-runc-k8s.io-f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e-runc.h6n6Ac.mount: Deactivated successfully. May 17 00:42:49.526670 env[1255]: time="2025-05-17T00:42:49.526647188Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:49.529495 env[1255]: time="2025-05-17T00:42:49.529478828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:49.531240 env[1255]: time="2025-05-17T00:42:49.531228315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:49.532752 env[1255]: time="2025-05-17T00:42:49.532739713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:49.537683 systemd-networkd[1066]: calie2a364dd634: Gained IPv6LL May 17 00:42:49.548305 env[1255]: time="2025-05-17T00:42:49.548276455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:42:49.565533 env[1255]: time="2025-05-17T00:42:49.565510932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:42:49.602000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.602000 audit: BPF prog-id=184 op=LOAD May 17 00:42:49.602000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe554eede0 a2=98 a3=3 items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.602000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.603000 audit: BPF prog-id=184 op=UNLOAD May 17 00:42:49.608000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.608000 audit: BPF prog-id=185 op=LOAD May 17 00:42:49.608000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe554eebd0 a2=94 a3=54428f items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.608000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.609000 audit: BPF prog-id=185 op=UNLOAD May 17 00:42:49.609000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.609000 audit: BPF prog-id=186 op=LOAD May 17 00:42:49.609000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe554eec00 a2=94 a3=2 items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.609000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.609000 audit: BPF prog-id=186 op=UNLOAD May 17 00:42:49.671654 env[1255]: time="2025-05-17T00:42:49.671360442Z" level=info msg="CreateContainer within sandbox \"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:42:49.686030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3451860508.mount: Deactivated successfully. May 17 00:42:49.691932 env[1255]: time="2025-05-17T00:42:49.691863146Z" level=info msg="CreateContainer within sandbox \"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"df8285cab6198ae663432f152672a98eea3f16574cd01486aab7f03eec33d4a1\"" May 17 00:42:49.699637 env[1255]: time="2025-05-17T00:42:49.696908552Z" level=info msg="StartContainer for \"df8285cab6198ae663432f152672a98eea3f16574cd01486aab7f03eec33d4a1\"" May 17 00:42:49.717903 kubelet[2126]: I0517 00:42:49.717879 2126 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:42:49.729796 systemd[1]: Started cri-containerd-df8285cab6198ae663432f152672a98eea3f16574cd01486aab7f03eec33d4a1.scope. May 17 00:42:49.754861 kernel: kauditd_printk_skb: 698 callbacks suppressed May 17 00:42:49.755566 kernel: audit: type=1400 audit(1747442569.746:1193): avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.759520 kernel: audit: type=1300 audit(1747442569.746:1193): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc99e1b6608 items=0 ppid=3974 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.759550 kernel: audit: type=1327 audit(1747442569.746:1193): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383238356361623631393861653636333433326631353236373261 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc99e1b6608 items=0 ppid=3974 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.770943 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:42:49.770987 kernel: audit: type=1400 audit(1747442569.746:1194): avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.771007 kernel: audit: audit_lost=68 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:42:49.771023 kernel: audit: type=1400 audit(1747442569.746:1194): avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.771035 kernel: audit: backlog limit exceeded May 17 00:42:49.772981 kernel: audit: type=1400 audit(1747442569.746:1194): avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.773008 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:42:49.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383238356361623631393861653636333433326631353236373261 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit: BPF prog-id=187 op=LOAD May 17 00:42:49.746000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00033c2a8 items=0 ppid=3974 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383238356361623631393861653636333433326631353236373261 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit: BPF prog-id=188 op=LOAD May 17 00:42:49.746000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00033c2f8 items=0 ppid=3974 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383238356361623631393861653636333433326631353236373261 May 17 00:42:49.746000 audit: BPF prog-id=188 op=UNLOAD May 17 00:42:49.746000 audit: BPF prog-id=187 op=UNLOAD May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.746000 audit: BPF prog-id=189 op=LOAD May 17 00:42:49.746000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00033c388 items=0 ppid=3974 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383238356361623631393861653636333433326631353236373261 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.747000 audit: BPF prog-id=190 op=LOAD May 17 00:42:49.747000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe554eeac0 a2=94 a3=1 items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.747000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.750000 audit: BPF prog-id=190 op=UNLOAD May 17 00:42:49.750000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.750000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe554eeb90 a2=50 a3=7ffe554eec70 items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.750000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.758000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.758000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe554eead0 a2=28 a3=0 items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.758000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.768000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.768000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe554eea10 a2=28 a3=0 items=0 ppid=4473 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.768000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:42:49.772000 audit[4514]: NETFILTER_CFG table=filter:109 family=2 entries=15 op=nft_register_rule pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:49.772000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff1180b9c0 a2=0 a3=7fff1180b9ac items=0 ppid=2280 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:49.777000 audit[4514]: NETFILTER_CFG table=nat:110 family=2 entries=25 op=nft_register_chain pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:49.777000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7fff1180b9c0 a2=0 a3=7fff1180b9ac items=0 ppid=2280 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:49.787504 env[1255]: time="2025-05-17T00:42:49.784878885Z" level=info msg="StartContainer for \"df8285cab6198ae663432f152672a98eea3f16574cd01486aab7f03eec33d4a1\" returns successfully" May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit: BPF prog-id=192 op=LOAD May 17 00:42:49.828000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb7c22230 a2=98 a3=1999999999999999 items=0 ppid=4473 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.828000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:42:49.828000 audit: BPF prog-id=192 op=UNLOAD May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit: BPF prog-id=193 op=LOAD May 17 00:42:49.828000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb7c22110 a2=94 a3=ffff items=0 ppid=4473 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.828000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:42:49.828000 audit: BPF prog-id=193 op=UNLOAD May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:49.828000 audit: BPF prog-id=194 op=LOAD May 17 00:42:49.828000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb7c22150 a2=94 a3=7ffdb7c22330 items=0 ppid=4473 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:49.828000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:42:49.828000 audit: BPF prog-id=194 op=UNLOAD May 17 00:42:49.983713 systemd-networkd[1066]: vxlan.calico: Link UP May 17 00:42:49.983718 systemd-networkd[1066]: vxlan.calico: Gained carrier May 17 00:42:50.023000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.023000 audit: BPF prog-id=195 op=LOAD May 17 00:42:50.023000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4eac0910 a2=98 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.023000 audit: BPF prog-id=195 op=UNLOAD May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit: BPF prog-id=196 op=LOAD May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4eac0720 a2=94 a3=54428f items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit: BPF prog-id=196 op=UNLOAD May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit: BPF prog-id=197 op=LOAD May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4eac0750 a2=94 a3=2 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit: BPF prog-id=197 op=UNLOAD May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4eac0620 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4eac0650 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4eac0560 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4eac0670 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4eac0650 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4eac0640 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4eac0670 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4eac0650 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4eac0670 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4eac0640 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4eac06b0 a2=28 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit: BPF prog-id=198 op=LOAD May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4eac0520 a2=94 a3=0 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit: BPF prog-id=198 op=UNLOAD May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff4eac0510 a2=50 a3=2800 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff4eac0510 a2=50 a3=2800 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit: BPF prog-id=199 op=LOAD May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4eabfd30 a2=94 a3=2 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.024000 audit: BPF prog-id=199 op=UNLOAD May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.024000 audit: BPF prog-id=200 op=LOAD May 17 00:42:50.024000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4eabfe30 a2=94 a3=30 items=0 ppid=4473 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.027000 audit: BPF prog-id=201 op=LOAD May 17 00:42:50.027000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0b0de480 a2=98 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.027000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.027000 audit: BPF prog-id=201 op=UNLOAD May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit: BPF prog-id=202 op=LOAD May 17 00:42:50.036000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0b0de270 a2=94 a3=54428f items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.036000 audit: BPF prog-id=202 op=UNLOAD May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.036000 audit: BPF prog-id=203 op=LOAD May 17 00:42:50.036000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0b0de2a0 a2=94 a3=2 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.036000 audit: BPF prog-id=203 op=UNLOAD May 17 00:42:50.049639 systemd-networkd[1066]: cali993d595b7cf: Gained IPv6LL May 17 00:42:50.177000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit: BPF prog-id=204 op=LOAD May 17 00:42:50.177000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0b0de160 a2=94 a3=1 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.177000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.177000 audit: BPF prog-id=204 op=UNLOAD May 17 00:42:50.177000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.177000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0b0de230 a2=50 a3=7fff0b0de310 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.177000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b0de170 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0b0de1a0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0b0de0b0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b0de1c0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b0de1a0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b0de190 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b0de1c0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0b0de1a0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0b0de1c0 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0b0de190 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b0de200 a2=28 a3=0 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0b0ddfb0 a2=50 a3=1 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit: BPF prog-id=205 op=LOAD May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0b0ddfb0 a2=94 a3=5 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit: BPF prog-id=205 op=UNLOAD May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0b0de060 a2=50 a3=1 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff0b0de180 a2=4 a3=38 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.186000 audit[4554]: AVC avc: denied { confidentiality } for pid=4554 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:50.186000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0b0de1d0 a2=94 a3=6 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { confidentiality } for pid=4554 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:50.187000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0b0dd980 a2=94 a3=88 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.187000 audit[4554]: AVC avc: denied { confidentiality } for pid=4554 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:50.187000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0b0dd980 a2=94 a3=88 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.188000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.188000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0b0df3b0 a2=10 a3=f8f00800 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.188000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.188000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0b0df250 a2=10 a3=3 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.188000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.188000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0b0df1f0 a2=10 a3=3 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.188000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:50.188000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0b0df1f0 a2=10 a3=7 items=0 ppid=4473 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:42:50.197000 audit: BPF prog-id=200 op=UNLOAD May 17 00:42:50.274000 audit[4598]: NETFILTER_CFG table=mangle:111 family=2 entries=16 op=nft_register_chain pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:50.274000 audit[4598]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffea253b930 a2=0 a3=7ffea253b91c items=0 ppid=4473 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.274000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:50.286000 audit[4597]: NETFILTER_CFG table=raw:112 family=2 entries=21 op=nft_register_chain pid=4597 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:50.286000 audit[4597]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd0875cd90 a2=0 a3=7ffd0875cd7c items=0 ppid=4473 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.286000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:50.289000 audit[4601]: NETFILTER_CFG table=nat:113 family=2 entries=15 op=nft_register_chain pid=4601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:50.289000 audit[4601]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdba435360 a2=0 a3=7ffdba43534c items=0 ppid=4473 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:50.301000 audit[4602]: NETFILTER_CFG table=filter:114 family=2 entries=315 op=nft_register_chain pid=4602 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:50.301000 audit[4602]: SYSCALL arch=c000003e syscall=46 success=yes exit=187764 a0=3 a1=7ffe24db0540 a2=0 a3=7ffe24db052c items=0 ppid=4473 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.301000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:50.444595 systemd[1]: run-containerd-runc-k8s.io-df8285cab6198ae663432f152672a98eea3f16574cd01486aab7f03eec33d4a1-runc.TPhSNr.mount: Deactivated successfully. May 17 00:42:50.659000 audit[4614]: NETFILTER_CFG table=filter:115 family=2 entries=13 op=nft_register_rule pid=4614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:50.659000 audit[4614]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdd343cb20 a2=0 a3=7ffdd343cb0c items=0 ppid=2280 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:50.665000 audit[4614]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:50.665000 audit[4614]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdd343cb20 a2=0 a3=7ffdd343cb0c items=0 ppid=2280 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:50.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:51.393604 systemd-networkd[1066]: vxlan.calico: Gained IPv6LL May 17 00:42:53.318415 env[1255]: time="2025-05-17T00:42:53.318321030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:53.408265 env[1255]: time="2025-05-17T00:42:53.363237270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:53.408265 env[1255]: time="2025-05-17T00:42:53.377728622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:53.408265 env[1255]: time="2025-05-17T00:42:53.405840757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:53.408265 env[1255]: time="2025-05-17T00:42:53.406316854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:42:53.600154 env[1255]: time="2025-05-17T00:42:53.599932437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:42:53.954091 env[1255]: time="2025-05-17T00:42:53.953992308Z" level=info msg="CreateContainer within sandbox \"f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:42:54.023183 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1290807714.mount: Deactivated successfully. May 17 00:42:54.068833 env[1255]: time="2025-05-17T00:42:54.049937295Z" level=info msg="CreateContainer within sandbox \"f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"68de9118cd7cddfdda407ccd799dde89ee14f9f4c5cb218fbf6e62744fb125af\"" May 17 00:42:54.083528 env[1255]: time="2025-05-17T00:42:54.083013170Z" level=info msg="StartContainer for \"68de9118cd7cddfdda407ccd799dde89ee14f9f4c5cb218fbf6e62744fb125af\"" May 17 00:42:54.117015 systemd[1]: Started cri-containerd-68de9118cd7cddfdda407ccd799dde89ee14f9f4c5cb218fbf6e62744fb125af.scope. May 17 00:42:54.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit: BPF prog-id=206 op=LOAD May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4260 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646539313138636437636464666464613430376363643739396464 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4260 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646539313138636437636464666464613430376363643739396464 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit: BPF prog-id=207 op=LOAD May 17 00:42:54.135000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003046a0 items=0 ppid=4260 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646539313138636437636464666464613430376363643739396464 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit: BPF prog-id=208 op=LOAD May 17 00:42:54.135000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003046e8 items=0 ppid=4260 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646539313138636437636464666464613430376363643739396464 May 17 00:42:54.135000 audit: BPF prog-id=208 op=UNLOAD May 17 00:42:54.135000 audit: BPF prog-id=207 op=UNLOAD May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:54.135000 audit: BPF prog-id=209 op=LOAD May 17 00:42:54.135000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304af8 items=0 ppid=4260 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646539313138636437636464666464613430376363643739396464 May 17 00:42:54.168913 env[1255]: time="2025-05-17T00:42:54.168878980Z" level=info msg="StartContainer for \"68de9118cd7cddfdda407ccd799dde89ee14f9f4c5cb218fbf6e62744fb125af\" returns successfully" May 17 00:42:54.266202 env[1255]: time="2025-05-17T00:42:54.264531464Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:54.267076 env[1255]: time="2025-05-17T00:42:54.267049845Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:54.300756 kubelet[2126]: E0517 00:42:54.298972 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:42:54.306745 kubelet[2126]: E0517 00:42:54.306708 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:42:54.307020 env[1255]: time="2025-05-17T00:42:54.306991895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:42:54.381708 kubelet[2126]: E0517 00:42:54.381538 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rfqzj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-nwrcr_calico-system(53e1d52b-66eb-4d04-b85e-c5d1304df65c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:54.391662 kubelet[2126]: E0517 00:42:54.391468 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:42:55.127390 systemd[1]: run-containerd-runc-k8s.io-68de9118cd7cddfdda407ccd799dde89ee14f9f4c5cb218fbf6e62744fb125af-runc.1YtjSX.mount: Deactivated successfully. May 17 00:42:55.527627 kubelet[2126]: E0517 00:42:55.527365 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:42:55.981823 kubelet[2126]: I0517 00:42:55.973993 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-779d9bfb7-f5cmw" podStartSLOduration=29.144786458 podStartE2EDuration="34.971524852s" podCreationTimestamp="2025-05-17 00:42:21 +0000 UTC" firstStartedPulling="2025-05-17 00:42:47.685173274 +0000 UTC m=+42.700754475" lastFinishedPulling="2025-05-17 00:42:53.511911661 +0000 UTC m=+48.527492869" observedRunningTime="2025-05-17 00:42:55.967362741 +0000 UTC m=+50.982943958" watchObservedRunningTime="2025-05-17 00:42:55.971524852 +0000 UTC m=+50.987106062" May 17 00:42:56.540000 audit[4697]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:56.616759 kernel: kauditd_printk_skb: 623 callbacks suppressed May 17 00:42:56.679037 kernel: audit: type=1325 audit(1747442576.540:1293): table=filter:117 family=2 entries=12 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:56.696912 kernel: audit: type=1300 audit(1747442576.540:1293): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe2c977f10 a2=0 a3=7ffe2c977efc items=0 ppid=2280 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.696963 kernel: audit: type=1327 audit(1747442576.540:1293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:56.696984 kernel: audit: type=1325 audit(1747442576.557:1294): table=nat:118 family=2 entries=22 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:56.697013 kernel: audit: type=1300 audit(1747442576.557:1294): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe2c977f10 a2=0 a3=7ffe2c977efc items=0 ppid=2280 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.711502 kernel: audit: type=1327 audit(1747442576.557:1294): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:56.540000 audit[4697]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe2c977f10 a2=0 a3=7ffe2c977efc items=0 ppid=2280 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:56.557000 audit[4697]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:56.557000 audit[4697]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe2c977f10 a2=0 a3=7ffe2c977efc items=0 ppid=2280 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:56.799869 env[1255]: time="2025-05-17T00:42:56.796525111Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:56.826210 env[1255]: time="2025-05-17T00:42:56.826181808Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:56.841600 env[1255]: time="2025-05-17T00:42:56.841576182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:56.853095 env[1255]: time="2025-05-17T00:42:56.853063835Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:56.853567 env[1255]: time="2025-05-17T00:42:56.853543326Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:42:56.870544 env[1255]: time="2025-05-17T00:42:56.870510319Z" level=info msg="CreateContainer within sandbox \"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:42:56.884276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2241018984.mount: Deactivated successfully. May 17 00:42:56.884939 env[1255]: time="2025-05-17T00:42:56.884909467Z" level=info msg="CreateContainer within sandbox \"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2e1376169b92b2bb0d1011fd5cc994425fa161e0995698cd94d88227abd26a9c\"" May 17 00:42:56.885508 env[1255]: time="2025-05-17T00:42:56.885488531Z" level=info msg="StartContainer for \"2e1376169b92b2bb0d1011fd5cc994425fa161e0995698cd94d88227abd26a9c\"" May 17 00:42:56.912490 systemd[1]: Started cri-containerd-2e1376169b92b2bb0d1011fd5cc994425fa161e0995698cd94d88227abd26a9c.scope. May 17 00:42:56.916957 systemd[1]: run-containerd-runc-k8s.io-2e1376169b92b2bb0d1011fd5cc994425fa161e0995698cd94d88227abd26a9c-runc.KHyCmL.mount: Deactivated successfully. May 17 00:42:56.937000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.953714 kernel: audit: type=1400 audit(1747442576.937:1295): avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.953771 kernel: audit: type=1300 audit(1747442576.937:1295): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f52f4dcb608 items=0 ppid=3974 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.954524 kernel: audit: type=1327 audit(1747442576.937:1295): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313337363136396239326232626230643130313166643563633939 May 17 00:42:56.954550 kernel: audit: type=1400 audit(1747442576.949:1296): avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.937000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f52f4dcb608 items=0 ppid=3974 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313337363136396239326232626230643130313166643563633939 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit: BPF prog-id=210 op=LOAD May 17 00:42:56.949000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00031c968 items=0 ppid=3974 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313337363136396239326232626230643130313166643563633939 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.949000 audit: BPF prog-id=211 op=LOAD May 17 00:42:56.949000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00031c9b8 items=0 ppid=3974 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313337363136396239326232626230643130313166643563633939 May 17 00:42:56.950000 audit: BPF prog-id=211 op=UNLOAD May 17 00:42:56.950000 audit: BPF prog-id=210 op=UNLOAD May 17 00:42:56.950000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.950000 audit: BPF prog-id=212 op=LOAD May 17 00:42:56.950000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00031ca48 items=0 ppid=3974 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313337363136396239326232626230643130313166643563633939 May 17 00:42:56.973806 env[1255]: time="2025-05-17T00:42:56.973628326Z" level=info msg="StartContainer for \"2e1376169b92b2bb0d1011fd5cc994425fa161e0995698cd94d88227abd26a9c\" returns successfully" May 17 00:42:57.319850 env[1255]: time="2025-05-17T00:42:57.319823613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:42:57.583707 kubelet[2126]: I0517 00:42:57.583638 2126 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:42:57.587783 kubelet[2126]: I0517 00:42:57.587771 2126 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:42:57.590293 env[1255]: time="2025-05-17T00:42:57.590203554Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:57.594347 env[1255]: time="2025-05-17T00:42:57.594281031Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:57.594515 kubelet[2126]: E0517 00:42:57.594495 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:57.594600 kubelet[2126]: E0517 00:42:57.594588 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:57.594729 kubelet[2126]: E0517 00:42:57.594709 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:cf0ee066c06f40c3a296171ef7dbd085,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:57.596660 env[1255]: time="2025-05-17T00:42:57.596532141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:42:57.838056 env[1255]: time="2025-05-17T00:42:57.837977499Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:57.840455 env[1255]: time="2025-05-17T00:42:57.838736160Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:57.841200 kubelet[2126]: E0517 00:42:57.838910 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:57.841200 kubelet[2126]: E0517 00:42:57.838946 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:57.841200 kubelet[2126]: E0517 00:42:57.839074 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:57.841200 kubelet[2126]: E0517 00:42:57.840987 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55cbb6f5c7-pnl7s" podUID="de81bf95-10d0-45c0-abc5-41dac89311e0" May 17 00:42:58.444000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:58.444000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:58.444000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed03e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:58.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:58.444000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e6fa10 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:42:58.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:59.654000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:59.654000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00a7fd410 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:42:59.654000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:42:59.687000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:59.687000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00a23f8a0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:42:59.687000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:42:59.730000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:59.730000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00a7fd470 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:42:59.730000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:42:59.735000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:59.735000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00a23f920 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:42:59.735000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:42:59.735000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:59.735000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00a7fd500 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:42:59.735000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:42:59.745000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5212 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:59.745000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00a8771d0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:42:59.745000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:43:00.325162 systemd[1]: Started sshd@7-139.178.70.109:22-140.249.181.31:46990.service. May 17 00:43:00.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.109:22-140.249.181.31:46990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:02.216062 sshd[4738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.181.31 user=root May 17 00:43:02.257755 kernel: kauditd_printk_skb: 64 callbacks suppressed May 17 00:43:02.257812 kernel: audit: type=1100 audit(1747442582.215:1310): pid=4738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=140.249.181.31 addr=140.249.181.31 terminal=ssh res=failed' May 17 00:43:02.215000 audit[4738]: USER_AUTH pid=4738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=140.249.181.31 addr=140.249.181.31 terminal=ssh res=failed' May 17 00:43:03.756433 sshd[4738]: Failed password for root from 140.249.181.31 port 46990 ssh2 May 17 00:43:04.632502 systemd[1]: run-containerd-runc-k8s.io-68de9118cd7cddfdda407ccd799dde89ee14f9f4c5cb218fbf6e62744fb125af-runc.Zt4toJ.mount: Deactivated successfully. May 17 00:43:05.759723 sshd[4738]: Received disconnect from 140.249.181.31 port 46990:11: Bye Bye [preauth] May 17 00:43:05.759723 sshd[4738]: Disconnected from authenticating user root 140.249.181.31 port 46990 [preauth] May 17 00:43:05.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.109:22-140.249.181.31:46990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:05.774518 kernel: audit: type=1131 audit(1747442585.767:1311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.109:22-140.249.181.31:46990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:05.767473 systemd[1]: sshd@7-139.178.70.109:22-140.249.181.31:46990.service: Deactivated successfully. May 17 00:43:05.839031 env[1255]: time="2025-05-17T00:43:05.839002953Z" level=info msg="StopPodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\"" May 17 00:43:06.338000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.338000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e157a0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.346752 kernel: audit: type=1400 audit(1747442586.338:1312): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.346833 kernel: audit: type=1300 audit(1747442586.338:1312): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e157a0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.346861 kernel: audit: type=1327 audit(1747442586.338:1312): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:06.338000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:06.350186 kernel: audit: type=1400 audit(1747442586.339:1313): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.339000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.353181 kernel: audit: type=1300 audit(1747442586.339:1313): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed08c0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.339000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed08c0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.357424 kernel: audit: type=1327 audit(1747442586.339:1313): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:06.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:06.360696 kernel: audit: type=1400 audit(1747442586.339:1314): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.339000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.339000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed08e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.367670 kernel: audit: type=1300 audit(1747442586.339:1314): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed08e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:06.342000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:06.342000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e157c0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:06.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:07.496226 env[1255]: time="2025-05-17T00:43:07.496198430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:43:07.542233 kubelet[2126]: I0517 00:43:07.533831 2126 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mckdw" podStartSLOduration=36.320736956 podStartE2EDuration="47.5204381s" podCreationTimestamp="2025-05-17 00:42:20 +0000 UTC" firstStartedPulling="2025-05-17 00:42:45.658651981 +0000 UTC m=+40.674233184" lastFinishedPulling="2025-05-17 00:42:56.858353116 +0000 UTC m=+51.873934328" observedRunningTime="2025-05-17 00:42:57.911901386 +0000 UTC m=+52.927482600" watchObservedRunningTime="2025-05-17 00:43:07.5204381 +0000 UTC m=+62.536019307" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.131 [WARNING][4779] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--56l6r-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"8dc7f54e-cda6-468d-b616-716c37ee92f8", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1", Pod:"coredns-674b8bbfcf-56l6r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali468858dba40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.134 [INFO][4779] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.134 [INFO][4779] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" iface="eth0" netns="" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.134 [INFO][4779] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.134 [INFO][4779] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.640 [INFO][4786] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.648 [INFO][4786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.648 [INFO][4786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.659 [WARNING][4786] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.659 [INFO][4786] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.660 [INFO][4786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:07.663184 env[1255]: 2025-05-17 00:43:07.661 [INFO][4779] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.666071 env[1255]: time="2025-05-17T00:43:07.663444802Z" level=info msg="TearDown network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" successfully" May 17 00:43:07.666071 env[1255]: time="2025-05-17T00:43:07.663466226Z" level=info msg="StopPodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" returns successfully" May 17 00:43:07.685780 env[1255]: time="2025-05-17T00:43:07.685761900Z" level=info msg="RemovePodSandbox for \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\"" May 17 00:43:07.685925 env[1255]: time="2025-05-17T00:43:07.685890258Z" level=info msg="Forcibly stopping sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\"" May 17 00:43:07.784081 env[1255]: time="2025-05-17T00:43:07.783603355Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.763 [WARNING][4804] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--56l6r-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"8dc7f54e-cda6-468d-b616-716c37ee92f8", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c49e7bdf987e92184fa109f62f35e6809a8bff9a451474f49e2d0e7149e8fbf1", Pod:"coredns-674b8bbfcf-56l6r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali468858dba40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.763 [INFO][4804] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.763 [INFO][4804] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" iface="eth0" netns="" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.763 [INFO][4804] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.763 [INFO][4804] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.776 [INFO][4812] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.776 [INFO][4812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.776 [INFO][4812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.779 [WARNING][4812] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.779 [INFO][4812] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" HandleID="k8s-pod-network.92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" Workload="localhost-k8s-coredns--674b8bbfcf--56l6r-eth0" May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.780 [INFO][4812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:07.784325 env[1255]: 2025-05-17 00:43:07.782 [INFO][4804] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b" May 17 00:43:07.785116 env[1255]: time="2025-05-17T00:43:07.784502560Z" level=info msg="TearDown network for sandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" successfully" May 17 00:43:07.785351 env[1255]: time="2025-05-17T00:43:07.785333112Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:07.787729 env[1255]: time="2025-05-17T00:43:07.787715529Z" level=info msg="RemovePodSandbox \"92c122d5a51a669587b2dd3df3b045c3c61eb67c641ec9b2620d6acc5b7dbb9b\" returns successfully" May 17 00:43:07.788120 env[1255]: time="2025-05-17T00:43:07.788108419Z" level=info msg="StopPodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\"" May 17 00:43:07.788449 kubelet[2126]: E0517 00:43:07.788421 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:43:07.790565 kubelet[2126]: E0517 00:43:07.790544 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:43:07.795289 kubelet[2126]: E0517 00:43:07.795175 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rfqzj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-nwrcr_calico-system(53e1d52b-66eb-4d04-b85e-c5d1304df65c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:07.797559 kubelet[2126]: E0517 00:43:07.797535 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.816 [WARNING][4826] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"31a50143-b38b-436f-9b87-2b078a019036", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf", Pod:"coredns-674b8bbfcf-tlp7m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali19ae9484575", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.816 [INFO][4826] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.816 [INFO][4826] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" iface="eth0" netns="" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.816 [INFO][4826] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.816 [INFO][4826] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.833 [INFO][4833] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.833 [INFO][4833] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.834 [INFO][4833] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.837 [WARNING][4833] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.837 [INFO][4833] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.838 [INFO][4833] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:07.841224 env[1255]: 2025-05-17 00:43:07.840 [INFO][4826] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.841934 env[1255]: time="2025-05-17T00:43:07.841492635Z" level=info msg="TearDown network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" successfully" May 17 00:43:07.841934 env[1255]: time="2025-05-17T00:43:07.841514827Z" level=info msg="StopPodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" returns successfully" May 17 00:43:07.841934 env[1255]: time="2025-05-17T00:43:07.841828094Z" level=info msg="RemovePodSandbox for \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\"" May 17 00:43:07.841934 env[1255]: time="2025-05-17T00:43:07.841846092Z" level=info msg="Forcibly stopping sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\"" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.861 [WARNING][4848] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"31a50143-b38b-436f-9b87-2b078a019036", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9598e47d227b60040c4417fb784ffbc5e42d74469b3fa33c8e16e4662959dfaf", Pod:"coredns-674b8bbfcf-tlp7m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali19ae9484575", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.861 [INFO][4848] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.861 [INFO][4848] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" iface="eth0" netns="" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.863 [INFO][4848] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.863 [INFO][4848] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.876 [INFO][4855] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.877 [INFO][4855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.877 [INFO][4855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.880 [WARNING][4855] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.880 [INFO][4855] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" HandleID="k8s-pod-network.8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" Workload="localhost-k8s-coredns--674b8bbfcf--tlp7m-eth0" May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.881 [INFO][4855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:07.884051 env[1255]: 2025-05-17 00:43:07.882 [INFO][4848] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08" May 17 00:43:07.885464 env[1255]: time="2025-05-17T00:43:07.884361124Z" level=info msg="TearDown network for sandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" successfully" May 17 00:43:07.886829 env[1255]: time="2025-05-17T00:43:07.886810711Z" level=info msg="RemovePodSandbox \"8fd44d72cf0f1908799793e0ac29b29426732eb369bec87ff3bdb0f7bd589f08\" returns successfully" May 17 00:43:07.887244 env[1255]: time="2025-05-17T00:43:07.887227688Z" level=info msg="StopPodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\"" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.915 [WARNING][4870] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"2999001c-b44d-4ddb-8117-53b580949709", ResourceVersion:"969", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84", Pod:"calico-apiserver-75dcd5ccd6-j7l42", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali844e89bb94c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.916 [INFO][4870] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.916 [INFO][4870] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" iface="eth0" netns="" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.916 [INFO][4870] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.916 [INFO][4870] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.933 [INFO][4878] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.933 [INFO][4878] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.934 [INFO][4878] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.938 [WARNING][4878] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.938 [INFO][4878] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.938 [INFO][4878] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:07.941207 env[1255]: 2025-05-17 00:43:07.940 [INFO][4870] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:07.944732 env[1255]: time="2025-05-17T00:43:07.941343210Z" level=info msg="TearDown network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" successfully" May 17 00:43:07.944732 env[1255]: time="2025-05-17T00:43:07.941364816Z" level=info msg="StopPodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" returns successfully" May 17 00:43:07.944732 env[1255]: time="2025-05-17T00:43:07.941921865Z" level=info msg="RemovePodSandbox for \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\"" May 17 00:43:07.944732 env[1255]: time="2025-05-17T00:43:07.941939476Z" level=info msg="Forcibly stopping sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\"" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:07.969 [WARNING][4892] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"2999001c-b44d-4ddb-8117-53b580949709", ResourceVersion:"969", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2b45f756877db78f0d64c6f01b25bf706616feab08fa12d9b0ec40a887547f84", Pod:"calico-apiserver-75dcd5ccd6-j7l42", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali844e89bb94c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:07.969 [INFO][4892] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:07.969 [INFO][4892] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" iface="eth0" netns="" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:07.969 [INFO][4892] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:07.969 [INFO][4892] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.019 [INFO][4900] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.019 [INFO][4900] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.019 [INFO][4900] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.024 [WARNING][4900] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.024 [INFO][4900] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" HandleID="k8s-pod-network.ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--j7l42-eth0" May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.024 [INFO][4900] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.027458 env[1255]: 2025-05-17 00:43:08.026 [INFO][4892] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac" May 17 00:43:08.042459 env[1255]: time="2025-05-17T00:43:08.027592193Z" level=info msg="TearDown network for sandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" successfully" May 17 00:43:08.043484 env[1255]: time="2025-05-17T00:43:08.043436196Z" level=info msg="RemovePodSandbox \"ff9dc577e79d339ec01f761f3b944959e38a3c7820074fa331bdb6331b24fbac\" returns successfully" May 17 00:43:08.043819 env[1255]: time="2025-05-17T00:43:08.043807161Z" level=info msg="StopPodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\"" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.087 [WARNING][4914] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" WorkloadEndpoint="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.087 [INFO][4914] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.087 [INFO][4914] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" iface="eth0" netns="" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.087 [INFO][4914] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.087 [INFO][4914] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.100 [INFO][4921] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.100 [INFO][4921] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.100 [INFO][4921] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.105 [WARNING][4921] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.105 [INFO][4921] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.105 [INFO][4921] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.108461 env[1255]: 2025-05-17 00:43:08.107 [INFO][4914] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.130065 env[1255]: time="2025-05-17T00:43:08.108587921Z" level=info msg="TearDown network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" successfully" May 17 00:43:08.130065 env[1255]: time="2025-05-17T00:43:08.108609509Z" level=info msg="StopPodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" returns successfully" May 17 00:43:08.130065 env[1255]: time="2025-05-17T00:43:08.108883010Z" level=info msg="RemovePodSandbox for \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\"" May 17 00:43:08.130065 env[1255]: time="2025-05-17T00:43:08.108900467Z" level=info msg="Forcibly stopping sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\"" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.128 [WARNING][4935] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" WorkloadEndpoint="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.128 [INFO][4935] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.128 [INFO][4935] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" iface="eth0" netns="" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.128 [INFO][4935] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.128 [INFO][4935] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.160 [INFO][4942] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.160 [INFO][4942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.160 [INFO][4942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.164 [WARNING][4942] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.164 [INFO][4942] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" HandleID="k8s-pod-network.828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" Workload="localhost-k8s-whisker--6dbd79f4b5--24ktd-eth0" May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.165 [INFO][4942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.167887 env[1255]: 2025-05-17 00:43:08.166 [INFO][4935] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99" May 17 00:43:08.192190 env[1255]: time="2025-05-17T00:43:08.168087565Z" level=info msg="TearDown network for sandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" successfully" May 17 00:43:08.192190 env[1255]: time="2025-05-17T00:43:08.178795260Z" level=info msg="RemovePodSandbox \"828e1eb345b99f104264508743a02b0fe00359ed7f0f8b28a8b6a6c4a648df99\" returns successfully" May 17 00:43:08.192190 env[1255]: time="2025-05-17T00:43:08.179111819Z" level=info msg="StopPodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\"" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.200 [WARNING][4956] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"53e1d52b-66eb-4d04-b85e-c5d1304df65c", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e", Pod:"goldmane-78d55f7ddc-nwrcr", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali993d595b7cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.200 [INFO][4956] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.200 [INFO][4956] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" iface="eth0" netns="" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.200 [INFO][4956] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.200 [INFO][4956] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.225 [INFO][4963] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.225 [INFO][4963] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.225 [INFO][4963] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.229 [WARNING][4963] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.229 [INFO][4963] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.230 [INFO][4963] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.232684 env[1255]: 2025-05-17 00:43:08.231 [INFO][4956] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.248058 env[1255]: time="2025-05-17T00:43:08.232700262Z" level=info msg="TearDown network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" successfully" May 17 00:43:08.248058 env[1255]: time="2025-05-17T00:43:08.232720615Z" level=info msg="StopPodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" returns successfully" May 17 00:43:08.248058 env[1255]: time="2025-05-17T00:43:08.233229407Z" level=info msg="RemovePodSandbox for \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\"" May 17 00:43:08.248058 env[1255]: time="2025-05-17T00:43:08.233247326Z" level=info msg="Forcibly stopping sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\"" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.268 [WARNING][4977] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"53e1d52b-66eb-4d04-b85e-c5d1304df65c", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f47c4dee470e8adb92339cdd8b5c932a2a91083d99e2bb38e91ce4803ede360e", Pod:"goldmane-78d55f7ddc-nwrcr", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali993d595b7cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.268 [INFO][4977] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.268 [INFO][4977] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" iface="eth0" netns="" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.268 [INFO][4977] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.268 [INFO][4977] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.281 [INFO][4984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.281 [INFO][4984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.281 [INFO][4984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.288 [WARNING][4984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.288 [INFO][4984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" HandleID="k8s-pod-network.3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" Workload="localhost-k8s-goldmane--78d55f7ddc--nwrcr-eth0" May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.289 [INFO][4984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.291585 env[1255]: 2025-05-17 00:43:08.290 [INFO][4977] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7" May 17 00:43:08.306555 env[1255]: time="2025-05-17T00:43:08.291607306Z" level=info msg="TearDown network for sandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" successfully" May 17 00:43:08.306555 env[1255]: time="2025-05-17T00:43:08.301544518Z" level=info msg="RemovePodSandbox \"3073dc4da1c075b463bd70100f79fdc48a51a12653c46c8286390eeec1bf34c7\" returns successfully" May 17 00:43:08.306555 env[1255]: time="2025-05-17T00:43:08.302055441Z" level=info msg="StopPodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\"" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.346 [WARNING][4998] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"8871d705-da6a-40f6-bbd3-3e5f159b36d3", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9", Pod:"calico-apiserver-75dcd5ccd6-plw7j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicce868cbf21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.346 [INFO][4998] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.346 [INFO][4998] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" iface="eth0" netns="" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.346 [INFO][4998] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.346 [INFO][4998] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.375 [INFO][5005] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.375 [INFO][5005] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.375 [INFO][5005] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.411 [WARNING][5005] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.411 [INFO][5005] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.412 [INFO][5005] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.414886 env[1255]: 2025-05-17 00:43:08.413 [INFO][4998] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.422346 env[1255]: time="2025-05-17T00:43:08.414913037Z" level=info msg="TearDown network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" successfully" May 17 00:43:08.422346 env[1255]: time="2025-05-17T00:43:08.414934466Z" level=info msg="StopPodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" returns successfully" May 17 00:43:08.422346 env[1255]: time="2025-05-17T00:43:08.415217898Z" level=info msg="RemovePodSandbox for \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\"" May 17 00:43:08.422346 env[1255]: time="2025-05-17T00:43:08.415235112Z" level=info msg="Forcibly stopping sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\"" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.476 [WARNING][5019] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0", GenerateName:"calico-apiserver-75dcd5ccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"8871d705-da6a-40f6-bbd3-3e5f159b36d3", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75dcd5ccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"741185666f9890ddc2df6374b2b47703a1676129b3afb95466048c70d4c7a9d9", Pod:"calico-apiserver-75dcd5ccd6-plw7j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicce868cbf21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.476 [INFO][5019] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.476 [INFO][5019] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" iface="eth0" netns="" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.476 [INFO][5019] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.476 [INFO][5019] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.490 [INFO][5026] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.491 [INFO][5026] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.491 [INFO][5026] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.494 [WARNING][5026] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.495 [INFO][5026] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" HandleID="k8s-pod-network.8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" Workload="localhost-k8s-calico--apiserver--75dcd5ccd6--plw7j-eth0" May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.495 [INFO][5026] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.498342 env[1255]: 2025-05-17 00:43:08.497 [INFO][5019] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac" May 17 00:43:08.498856 env[1255]: time="2025-05-17T00:43:08.498837101Z" level=info msg="TearDown network for sandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" successfully" May 17 00:43:08.557445 env[1255]: time="2025-05-17T00:43:08.557364816Z" level=info msg="RemovePodSandbox \"8632dfb7fc77fff4d8c8fd595be7696e58720397bf1f311bc6fe2f4b574647ac\" returns successfully" May 17 00:43:08.565139 env[1255]: time="2025-05-17T00:43:08.558575434Z" level=info msg="StopPodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\"" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.598 [WARNING][5040] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mckdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d90242e4-0770-4c57-b411-99b69c529708", ResourceVersion:"1063", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50", Pod:"csi-node-driver-mckdw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2a39201a64e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.598 [INFO][5040] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.598 [INFO][5040] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" iface="eth0" netns="" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.598 [INFO][5040] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.598 [INFO][5040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.612 [INFO][5048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.612 [INFO][5048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.612 [INFO][5048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.633 [WARNING][5048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.633 [INFO][5048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.634 [INFO][5048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.636801 env[1255]: 2025-05-17 00:43:08.635 [INFO][5040] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.644675 env[1255]: time="2025-05-17T00:43:08.636820589Z" level=info msg="TearDown network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" successfully" May 17 00:43:08.644675 env[1255]: time="2025-05-17T00:43:08.636847143Z" level=info msg="StopPodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" returns successfully" May 17 00:43:08.644675 env[1255]: time="2025-05-17T00:43:08.637125291Z" level=info msg="RemovePodSandbox for \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\"" May 17 00:43:08.644675 env[1255]: time="2025-05-17T00:43:08.637143267Z" level=info msg="Forcibly stopping sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\"" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.678 [WARNING][5062] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mckdw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d90242e4-0770-4c57-b411-99b69c529708", ResourceVersion:"1063", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"14eb134aae587c28a247c0f2dd745f8cc0efbe7f0679fae10dea901e64d36c50", Pod:"csi-node-driver-mckdw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2a39201a64e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.679 [INFO][5062] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.679 [INFO][5062] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" iface="eth0" netns="" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.679 [INFO][5062] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.679 [INFO][5062] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.703 [INFO][5069] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.703 [INFO][5069] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.703 [INFO][5069] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.707 [WARNING][5069] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.707 [INFO][5069] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" HandleID="k8s-pod-network.cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" Workload="localhost-k8s-csi--node--driver--mckdw-eth0" May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.708 [INFO][5069] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.710746 env[1255]: 2025-05-17 00:43:08.709 [INFO][5062] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf" May 17 00:43:08.711127 env[1255]: time="2025-05-17T00:43:08.710761965Z" level=info msg="TearDown network for sandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" successfully" May 17 00:43:08.720683 env[1255]: time="2025-05-17T00:43:08.720658340Z" level=info msg="RemovePodSandbox \"cffb5102fec7b43a32b31cb4ac86f464f99e817035f50db8e57c372c92082cbf\" returns successfully" May 17 00:43:08.720977 env[1255]: time="2025-05-17T00:43:08.720961427Z" level=info msg="StopPodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\"" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.758 [WARNING][5084] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0", GenerateName:"calico-kube-controllers-779d9bfb7-", Namespace:"calico-system", SelfLink:"", UID:"a299081f-1077-4b1b-91a0-9abc8b5a40d8", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"779d9bfb7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af", Pod:"calico-kube-controllers-779d9bfb7-f5cmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie2a364dd634", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.759 [INFO][5084] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.759 [INFO][5084] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" iface="eth0" netns="" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.759 [INFO][5084] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.759 [INFO][5084] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.774 [INFO][5091] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.774 [INFO][5091] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.774 [INFO][5091] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.778 [WARNING][5091] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.778 [INFO][5091] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.779 [INFO][5091] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.781713 env[1255]: 2025-05-17 00:43:08.780 [INFO][5084] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.782057 env[1255]: time="2025-05-17T00:43:08.781734024Z" level=info msg="TearDown network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" successfully" May 17 00:43:08.782057 env[1255]: time="2025-05-17T00:43:08.781756974Z" level=info msg="StopPodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" returns successfully" May 17 00:43:08.782218 env[1255]: time="2025-05-17T00:43:08.782203948Z" level=info msg="RemovePodSandbox for \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\"" May 17 00:43:08.782308 env[1255]: time="2025-05-17T00:43:08.782280456Z" level=info msg="Forcibly stopping sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\"" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.803 [WARNING][5107] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0", GenerateName:"calico-kube-controllers-779d9bfb7-", Namespace:"calico-system", SelfLink:"", UID:"a299081f-1077-4b1b-91a0-9abc8b5a40d8", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 42, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"779d9bfb7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f5439f2a7623ceca0e2b2b53f5dc41d498082124e731dfcc9c17e03ec5fd72af", Pod:"calico-kube-controllers-779d9bfb7-f5cmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie2a364dd634", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.804 [INFO][5107] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.804 [INFO][5107] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" iface="eth0" netns="" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.804 [INFO][5107] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.804 [INFO][5107] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.816 [INFO][5114] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.816 [INFO][5114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.816 [INFO][5114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.820 [WARNING][5114] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.820 [INFO][5114] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" HandleID="k8s-pod-network.aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" Workload="localhost-k8s-calico--kube--controllers--779d9bfb7--f5cmw-eth0" May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.821 [INFO][5114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:08.823397 env[1255]: 2025-05-17 00:43:08.822 [INFO][5107] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82" May 17 00:43:08.824571 env[1255]: time="2025-05-17T00:43:08.824131012Z" level=info msg="TearDown network for sandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" successfully" May 17 00:43:08.825925 env[1255]: time="2025-05-17T00:43:08.825912611Z" level=info msg="RemovePodSandbox \"aeac8d5a6f7a8d954dd21e607f1722c2c2153ce76c4409ec0f21860e62b00e82\" returns successfully" May 17 00:43:12.323667 kubelet[2126]: E0517 00:43:12.323640 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55cbb6f5c7-pnl7s" podUID="de81bf95-10d0-45c0-abc5-41dac89311e0" May 17 00:43:20.249418 kubelet[2126]: E0517 00:43:20.249353 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:43:24.500062 env[1255]: time="2025-05-17T00:43:24.499947487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:43:24.906153 env[1255]: time="2025-05-17T00:43:24.905853009Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:24.906516 env[1255]: time="2025-05-17T00:43:24.906440531Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:24.921044 kubelet[2126]: E0517 00:43:24.917743 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:43:24.923108 kubelet[2126]: E0517 00:43:24.923072 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:43:24.928256 kubelet[2126]: E0517 00:43:24.927404 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:cf0ee066c06f40c3a296171ef7dbd085,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:24.932357 env[1255]: time="2025-05-17T00:43:24.932101323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:43:25.173638 env[1255]: time="2025-05-17T00:43:25.173374819Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:43:25.459108 env[1255]: time="2025-05-17T00:43:25.458974987Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:43:25.461908 kubelet[2126]: E0517 00:43:25.461866 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:43:25.461908 kubelet[2126]: E0517 00:43:25.461905 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:43:25.462869 kubelet[2126]: E0517 00:43:25.461985 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:43:25.473211 kubelet[2126]: E0517 00:43:25.472206 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55cbb6f5c7-pnl7s" podUID="de81bf95-10d0-45c0-abc5-41dac89311e0" May 17 00:43:29.633014 systemd[1]: Started sshd@8-139.178.70.109:22-147.75.109.163:36618.service. May 17 00:43:29.861223 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 00:43:29.874156 kernel: audit: type=1130 audit(1747442609.656:1316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-147.75.109.163:36618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:29.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-147.75.109.163:36618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:30.355000 audit[5173]: USER_ACCT pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.376887 kernel: audit: type=1101 audit(1747442610.355:1317): pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.380796 kernel: audit: type=1103 audit(1747442610.362:1318): pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.382006 kernel: audit: type=1006 audit(1747442610.363:1319): pid=5173 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:43:30.386592 kernel: audit: type=1300 audit(1747442610.363:1319): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc45164640 a2=3 a3=0 items=0 ppid=1 pid=5173 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:30.387630 kernel: audit: type=1327 audit(1747442610.363:1319): proctitle=737368643A20636F7265205B707269765D May 17 00:43:30.362000 audit[5173]: CRED_ACQ pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.363000 audit[5173]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc45164640 a2=3 a3=0 items=0 ppid=1 pid=5173 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:30.363000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:30.412432 sshd[5173]: Accepted publickey for core from 147.75.109.163 port 36618 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:43:30.392891 sshd[5173]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:30.642330 systemd-logind[1246]: New session 10 of user core. May 17 00:43:30.674540 kernel: audit: type=1105 audit(1747442610.661:1320): pid=5173 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.674642 kernel: audit: type=1103 audit(1747442610.665:1321): pid=5184 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.661000 audit[5173]: USER_START pid=5173 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.665000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:30.658472 systemd[1]: Started session-10.scope. May 17 00:43:37.295020 kubelet[2126]: I0517 00:43:36.949067 2126 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:43:48.996000 audit[4323]: AVC avc: denied { watch } for pid=4323 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.1919281206/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c442,c969 tclass=file permissive=0 May 17 00:43:49.295354 kernel: audit: type=1400 audit(1747442628.996:1322): avc: denied { watch } for pid=4323 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.1919281206/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c442,c969 tclass=file permissive=0 May 17 00:43:49.302641 kernel: audit: type=1300 audit(1747442628.996:1322): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010b1180 a2=fc6 a3=0 items=0 ppid=3926 pid=4323 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 key=(null) May 17 00:43:49.305769 kernel: audit: type=1327 audit(1747442628.996:1322): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:43:49.305798 kernel: audit: type=1400 audit(1747442629.026:1323): avc: denied { watch } for pid=4199 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.380524143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c314,c791 tclass=file permissive=0 May 17 00:43:49.307093 kernel: audit: type=1300 audit(1747442629.026:1323): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b552c0 a2=fc6 a3=0 items=0 ppid=3675 pid=4199 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 key=(null) May 17 00:43:49.308518 kernel: audit: type=1327 audit(1747442629.026:1323): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:43:48.996000 audit[4323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010b1180 a2=fc6 a3=0 items=0 ppid=3926 pid=4323 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 key=(null) May 17 00:43:48.996000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:43:49.026000 audit[4199]: AVC avc: denied { watch } for pid=4199 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.380524143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c314,c791 tclass=file permissive=0 May 17 00:43:49.026000 audit[4199]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b552c0 a2=fc6 a3=0 items=0 ppid=3675 pid=4199 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 key=(null) May 17 00:43:49.026000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:43:58.560000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:58.823722 kernel: audit: type=1400 audit(1747442638.560:1324): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:58.876323 kernel: audit: type=1300 audit(1747442638.560:1324): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00132fb30 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:58.876418 kernel: audit: type=1327 audit(1747442638.560:1324): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:58.876450 kernel: audit: type=1400 audit(1747442638.569:1325): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:58.876480 kernel: audit: type=1300 audit(1747442638.569:1325): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012b2fc0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:58.876607 kernel: audit: type=1327 audit(1747442638.569:1325): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:58.560000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00132fb30 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:58.560000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:58.569000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:58.569000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012b2fc0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:43:58.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:43:59.871000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5212 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:00.183306 kernel: audit: type=1400 audit(1747442639.871:1326): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5212 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:00.253145 kernel: audit: type=1300 audit(1747442639.871:1326): arch=c000003e syscall=254 success=no exit=-13 a0=87 a1=c00dd8a8d0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:44:00.253240 kernel: audit: type=1327 audit(1747442639.871:1326): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:44:00.253284 kernel: audit: type=1400 audit(1747442639.896:1327): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:59.871000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=87 a1=c00dd8a8d0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:43:59.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:43:59.896000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:59.896000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=87 a1=c0127a3500 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:43:59.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:43:59.906000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:59.906000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=87 a1=c012b6cae0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:43:59.906000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:43:59.919000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:59.919000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c0127a35c0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:43:59.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:43:59.947000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:43:59.947000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=84 a1=c0127a35f0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:43:59.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:44:00.019000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:00.019000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c00f5da820 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:44:00.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:44:06.384357 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 00:44:06.642921 kernel: audit: type=1400 audit(1747442646.369:1332): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.649549 kernel: audit: type=1300 audit(1747442646.369:1332): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012b36a0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.658286 kernel: audit: type=1327 audit(1747442646.369:1332): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.664276 kernel: audit: type=1400 audit(1747442646.392:1333): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.667536 kernel: audit: type=1300 audit(1747442646.392:1333): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016ed1e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.671848 kernel: audit: type=1327 audit(1747442646.392:1333): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.671875 kernel: audit: type=1400 audit(1747442646.413:1334): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.677720 kernel: audit: type=1300 audit(1747442646.413:1334): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016ed200 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.677746 kernel: audit: type=1327 audit(1747442646.413:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.677764 kernel: audit: type=1400 audit(1747442646.444:1335): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.369000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.369000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012b36a0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.392000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.392000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016ed1e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.413000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.413000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016ed200 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.413000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:06.444000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:06.444000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016ed220 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:06.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:24.431645 systemd[1]: Started sshd@9-139.178.70.109:22-147.75.109.163:50872.service. May 17 00:44:24.517988 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:44:24.519274 kernel: audit: type=1130 audit(1747442664.433:1336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.109:22-147.75.109.163:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:24.519308 kernel: audit: type=1106 audit(1747442664.461:1337): pid=5173 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.521454 kernel: audit: type=1104 audit(1747442664.461:1338): pid=5173 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.521481 kernel: audit: type=1131 audit(1747442664.479:1339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-147.75.109.163:36618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:24.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.109:22-147.75.109.163:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:24.461000 audit[5173]: USER_END pid=5173 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.461000 audit[5173]: CRED_DISP pid=5173 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-147.75.109.163:36618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:24.480861 systemd[1]: sshd@8-139.178.70.109:22-147.75.109.163:36618.service: Deactivated successfully. May 17 00:44:24.434129 sshd[5173]: pam_unix(sshd:session): session closed for user core May 17 00:44:24.481472 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:44:24.481583 systemd[1]: session-10.scope: Consumed 5.140s CPU time. May 17 00:44:24.482772 systemd-logind[1246]: Session 10 logged out. Waiting for processes to exit. May 17 00:44:24.483477 systemd-logind[1246]: Removed session 10. May 17 00:44:24.559000 audit[5308]: USER_ACCT pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.563556 sshd[5308]: Accepted publickey for core from 147.75.109.163 port 50872 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:44:24.564413 kernel: audit: type=1101 audit(1747442664.559:1340): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.563000 audit[5308]: CRED_ACQ pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.570307 kernel: audit: type=1103 audit(1747442664.563:1341): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.570352 kernel: audit: type=1006 audit(1747442664.563:1342): pid=5308 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:44:24.570372 kernel: audit: type=1300 audit(1747442664.563:1342): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4c2df0c0 a2=3 a3=0 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:24.563000 audit[5308]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4c2df0c0 a2=3 a3=0 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:24.592624 kernel: audit: type=1327 audit(1747442664.563:1342): proctitle=737368643A20636F7265205B707269765D May 17 00:44:24.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:24.570624 sshd[5308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:24.614080 systemd-logind[1246]: New session 11 of user core. May 17 00:44:24.614580 systemd[1]: Started session-11.scope. May 17 00:44:24.623000 audit[5308]: USER_START pid=5308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.631404 kernel: audit: type=1105 audit(1747442664.623:1343): pid=5308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:24.630000 audit[5311]: CRED_ACQ pid=5311 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:25.053721 kubelet[2126]: E0517 00:44:25.052662 2126 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="52.877s" May 17 00:44:27.601874 env[1255]: time="2025-05-17T00:44:27.601752721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:44:27.685771 kubelet[2126]: E0517 00:44:27.601415 2126 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.325s" May 17 00:44:27.886135 env[1255]: time="2025-05-17T00:44:27.886031985Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:27.888726 env[1255]: time="2025-05-17T00:44:27.888661109Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:28.251000 audit[5344]: NETFILTER_CFG table=filter:119 family=2 entries=12 op=nft_register_rule pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:28.251000 audit[5344]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe3f1ecae0 a2=0 a3=7ffe3f1ecacc items=0 ppid=2280 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:28.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:28.258000 audit[5344]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:44:28.258000 audit[5344]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe3f1ecae0 a2=0 a3=7ffe3f1ecacc items=0 ppid=2280 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:28.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:44:30.162731 kubelet[2126]: E0517 00:44:30.144813 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:35.432120 kubelet[2126]: E0517 00:44:35.428948 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:44:38.049692 env[1255]: time="2025-05-17T00:44:38.049542260Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:44:38.311817 env[1255]: time="2025-05-17T00:44:38.311730412Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:44:38.327413 env[1255]: time="2025-05-17T00:44:38.327371452Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:44:47.229385 sshd[5308]: pam_unix(sshd:session): session closed for user core May 17 00:44:47.329687 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:44:47.333297 kernel: audit: type=1106 audit(1747442687.282:1347): pid=5308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.337867 kernel: audit: type=1104 audit(1747442687.286:1348): pid=5308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.337917 kernel: audit: type=1130 audit(1747442687.300:1349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-147.75.109.163:35446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:47.337935 kernel: audit: type=1131 audit(1747442687.304:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.109:22-147.75.109.163:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:47.282000 audit[5308]: USER_END pid=5308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.286000 audit[5308]: CRED_DISP pid=5308 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-147.75.109.163:35446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:47.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.109:22-147.75.109.163:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:44:47.301850 systemd[1]: Started sshd@10-139.178.70.109:22-147.75.109.163:35446.service. May 17 00:44:47.305641 systemd[1]: sshd@9-139.178.70.109:22-147.75.109.163:50872.service: Deactivated successfully. May 17 00:44:47.306251 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:44:47.306350 systemd[1]: session-11.scope: Consumed 2.743s CPU time. May 17 00:44:47.309737 systemd-logind[1246]: Session 11 logged out. Waiting for processes to exit. May 17 00:44:47.311143 systemd-logind[1246]: Removed session 11. May 17 00:44:47.413440 sshd[5364]: Accepted publickey for core from 147.75.109.163 port 35446 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:44:47.411000 audit[5364]: USER_ACCT pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.420434 kernel: audit: type=1101 audit(1747442687.411:1351): pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.419000 audit[5364]: CRED_ACQ pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.426779 kernel: audit: type=1103 audit(1747442687.419:1352): pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.430431 kernel: audit: type=1006 audit(1747442687.419:1353): pid=5364 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:44:47.430465 kernel: audit: type=1300 audit(1747442687.419:1353): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd309fa8d0 a2=3 a3=0 items=0 ppid=1 pid=5364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:47.432214 kernel: audit: type=1327 audit(1747442687.419:1353): proctitle=737368643A20636F7265205B707269765D May 17 00:44:47.419000 audit[5364]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd309fa8d0 a2=3 a3=0 items=0 ppid=1 pid=5364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:47.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:44:47.432624 sshd[5364]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:44:47.483702 systemd-logind[1246]: New session 12 of user core. May 17 00:44:47.484359 systemd[1]: Started session-12.scope. May 17 00:44:47.487000 audit[5364]: USER_START pid=5364 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.493397 kernel: audit: type=1105 audit(1747442687.487:1354): pid=5364 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:47.492000 audit[5367]: CRED_ACQ pid=5367 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:44:49.120000 audit[4199]: AVC avc: denied { watch } for pid=4199 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.380524143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c314,c791 tclass=file permissive=0 May 17 00:44:49.120000 audit[4199]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b54020 a2=fc6 a3=0 items=0 ppid=3675 pid=4199 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c791 key=(null) May 17 00:44:49.120000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:44:49.222000 audit[4323]: AVC avc: denied { watch } for pid=4323 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_42_32.1919281206/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c442,c969 tclass=file permissive=0 May 17 00:44:49.222000 audit[4323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00120d2a0 a2=fc6 a3=0 items=0 ppid=3926 pid=4323 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c969 key=(null) May 17 00:44:49.222000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:44:58.681000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:58.769830 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:44:58.779224 kernel: audit: type=1400 audit(1747442698.681:1358): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:58.779280 kernel: audit: type=1300 audit(1747442698.681:1358): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003578b80 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:58.779302 kernel: audit: type=1400 audit(1747442698.690:1359): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:58.780545 kernel: audit: type=1300 audit(1747442698.690:1359): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026d4de0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:58.780575 kernel: audit: type=1327 audit(1747442698.690:1359): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:58.780591 kernel: audit: type=1327 audit(1747442698.681:1358): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:58.681000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003578b80 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:58.690000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:58.690000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026d4de0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:44:58.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:58.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:44:59.824968 kubelet[2126]: E0517 00:44:50.672741 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:44:59.936643 kernel: audit: type=1400 audit(1747442699.919:1360): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:59.944033 kernel: audit: type=1400 audit(1747442699.923:1361): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:59.944069 kernel: audit: type=1300 audit(1747442699.923:1361): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00d93ba40 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:44:59.944088 kernel: audit: type=1327 audit(1747442699.923:1361): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:44:59.919000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:59.923000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:59.923000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00d93ba40 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:44:59.923000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:44:59.919000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c005344ea0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:44:59.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:44:59.956000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:44:59.956000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00d93bbf0 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:44:59.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:45:00.019000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:00.019000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00eb88420 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:45:00.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:45:00.068000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:00.068000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c012c29290 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:45:00.068000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:45:00.212000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5212 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:00.212000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ee64570 a2=fc6 a3=0 items=0 ppid=1864 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c881 key=(null) May 17 00:45:00.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:45:06.562000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.670037 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 00:45:06.680210 kernel: audit: type=1400 audit(1747442706.562:1366): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.681067 kernel: audit: type=1300 audit(1747442706.562:1366): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0034fbde0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.681111 kernel: audit: type=1327 audit(1747442706.562:1366): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:06.682191 kernel: audit: type=1400 audit(1747442706.586:1367): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.682991 kernel: audit: type=1300 audit(1747442706.586:1367): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c003579140 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.683033 kernel: audit: type=1327 audit(1747442706.586:1367): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:06.683065 kernel: audit: type=1400 audit(1747442706.590:1368): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.684845 kernel: audit: type=1300 audit(1747442706.590:1368): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0034fbe00 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.684878 kernel: audit: type=1327 audit(1747442706.590:1368): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:06.686391 kernel: audit: type=1400 audit(1747442706.610:1369): avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.562000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0034fbde0 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.562000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:06.586000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.586000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c003579140 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:06.590000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.590000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0034fbe00 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.590000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:06.610000 audit[1981]: AVC avc: denied { watch } for pid=1981 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:45:06.610000 audit[1981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0034fbe20 a2=fc6 a3=0 items=0 ppid=1825 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c744 key=(null) May 17 00:45:06.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:45:09.103145 kubelet[2126]: E0517 00:45:09.103000 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:45:09.451924 kubelet[2126]: E0517 00:45:08.753498 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:cf0ee066c06f40c3a296171ef7dbd085,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:45:10.879938 sshd[5364]: pam_unix(sshd:session): session closed for user core May 17 00:45:10.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.109:22-147.75.109.163:60384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:10.925000 audit[5364]: USER_END pid=5364 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.932000 audit[5364]: CRED_DISP pid=5364 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:10.886061 systemd[1]: Started sshd@11-139.178.70.109:22-147.75.109.163:60384.service. May 17 00:45:10.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-147.75.109.163:35446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:10.954611 systemd[1]: sshd@10-139.178.70.109:22-147.75.109.163:35446.service: Deactivated successfully. May 17 00:45:10.964695 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:45:10.964801 systemd[1]: session-12.scope: Consumed 2.994s CPU time. May 17 00:45:10.980784 systemd-logind[1246]: Session 12 logged out. Waiting for processes to exit. May 17 00:45:10.981699 systemd-logind[1246]: Removed session 12. May 17 00:45:11.237000 audit[5419]: USER_ACCT pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.238000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.238000 audit[5419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39b2b880 a2=3 a3=0 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:11.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:11.369816 sshd[5419]: Accepted publickey for core from 147.75.109.163 port 60384 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:45:11.277610 sshd[5419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:11.579802 systemd[1]: Started session-13.scope. May 17 00:45:11.579819 systemd-logind[1246]: New session 13 of user core. May 17 00:45:11.581000 audit[5419]: USER_START pid=5419 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.587619 kernel: kauditd_printk_skb: 11 callbacks suppressed May 17 00:45:11.627749 kernel: audit: type=1105 audit(1747442711.581:1377): pid=5419 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.627831 kernel: audit: type=1103 audit(1747442711.586:1378): pid=5423 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:11.586000 audit[5423]: CRED_ACQ pid=5423 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.261358 sshd[5419]: pam_unix(sshd:session): session closed for user core May 17 00:45:13.373614 kernel: audit: type=1130 audit(1747442713.281:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.109:22-147.75.109.163:60394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:13.403497 kernel: audit: type=1106 audit(1747442713.293:1380): pid=5419 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.403565 kernel: audit: type=1104 audit(1747442713.299:1381): pid=5419 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.414650 kernel: audit: type=1131 audit(1747442713.352:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.109:22-147.75.109.163:60384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:13.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.109:22-147.75.109.163:60394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:13.293000 audit[5419]: USER_END pid=5419 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.299000 audit[5419]: CRED_DISP pid=5419 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.109:22-147.75.109.163:60384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:13.282270 systemd[1]: Started sshd@12-139.178.70.109:22-147.75.109.163:60394.service. May 17 00:45:13.347492 systemd[1]: sshd@11-139.178.70.109:22-147.75.109.163:60384.service: Deactivated successfully. May 17 00:45:13.358730 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:45:13.365454 systemd-logind[1246]: Session 13 logged out. Waiting for processes to exit. May 17 00:45:13.365998 systemd-logind[1246]: Removed session 13. May 17 00:45:13.513000 audit[5432]: USER_ACCT pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.523982 kernel: audit: type=1101 audit(1747442713.513:1383): pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.524029 kernel: audit: type=1103 audit(1747442713.516:1384): pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.524052 kernel: audit: type=1006 audit(1747442713.516:1385): pid=5432 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:45:13.524067 kernel: audit: type=1300 audit(1747442713.516:1385): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdecd2810 a2=3 a3=0 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:13.516000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.516000 audit[5432]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdecd2810 a2=3 a3=0 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:13.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:13.544000 audit[5432]: USER_START pid=5432 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.545000 audit[5435]: CRED_ACQ pid=5435 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:13.579229 sshd[5432]: Accepted publickey for core from 147.75.109.163 port 60394 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:45:13.527510 sshd[5432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:13.542242 systemd[1]: Started session-14.scope. May 17 00:45:13.542556 systemd-logind[1246]: New session 14 of user core. May 17 00:45:14.150118 update_engine[1247]: I0517 00:45:14.146733 1247 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 17 00:45:14.150465 update_engine[1247]: I0517 00:45:14.150130 1247 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 17 00:45:14.187433 update_engine[1247]: I0517 00:45:14.187198 1247 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 17 00:45:14.188365 update_engine[1247]: I0517 00:45:14.188346 1247 omaha_request_params.cc:62] Current group set to lts May 17 00:45:14.205816 update_engine[1247]: I0517 00:45:14.205785 1247 update_attempter.cc:499] Already updated boot flags. Skipping. May 17 00:45:14.205816 update_engine[1247]: I0517 00:45:14.205802 1247 update_attempter.cc:643] Scheduling an action processor start. May 17 00:45:14.205816 update_engine[1247]: I0517 00:45:14.205821 1247 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 17 00:45:14.208528 update_engine[1247]: I0517 00:45:14.208510 1247 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 17 00:45:14.208588 update_engine[1247]: I0517 00:45:14.208575 1247 omaha_request_action.cc:270] Posting an Omaha request to disabled May 17 00:45:14.208588 update_engine[1247]: I0517 00:45:14.208580 1247 omaha_request_action.cc:271] Request: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: May 17 00:45:14.208588 update_engine[1247]: I0517 00:45:14.208582 1247 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:45:14.236120 update_engine[1247]: I0517 00:45:14.236016 1247 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:45:14.236646 update_engine[1247]: E0517 00:45:14.236474 1247 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:45:14.236646 update_engine[1247]: I0517 00:45:14.236543 1247 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 17 00:45:14.281239 locksmithd[1296]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 17 00:45:17.309395 kubelet[2126]: W0517 00:45:15.937678 2126 watcher.go:93] Error while processing event ("/sys/fs/cgroup/user.slice/user-500.slice/session-13.scope": 0x40000100 == IN_CREATE|IN_ISDIR): inotify_add_watch /sys/fs/cgroup/user.slice/user-500.slice/session-13.scope: no such file or directory May 17 00:45:19.230000 audit[5447]: NETFILTER_CFG table=filter:121 family=2 entries=24 op=nft_register_rule pid=5447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.478247 kernel: kauditd_printk_skb: 3 callbacks suppressed May 17 00:45:19.495218 kernel: audit: type=1325 audit(1747442719.230:1388): table=filter:121 family=2 entries=24 op=nft_register_rule pid=5447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.500558 kernel: audit: type=1300 audit(1747442719.230:1388): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffca0619f70 a2=0 a3=7ffca0619f5c items=0 ppid=2280 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.500632 kernel: audit: type=1327 audit(1747442719.230:1388): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:19.502681 kernel: audit: type=1325 audit(1747442719.239:1389): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.502722 kernel: audit: type=1300 audit(1747442719.239:1389): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffca0619f70 a2=0 a3=0 items=0 ppid=2280 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.502746 kernel: audit: type=1327 audit(1747442719.239:1389): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:19.504772 kernel: audit: type=1325 audit(1747442719.260:1390): table=filter:123 family=2 entries=36 op=nft_register_rule pid=5449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.504830 kernel: audit: type=1300 audit(1747442719.260:1390): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffcb5413590 a2=0 a3=7ffcb541357c items=0 ppid=2280 pid=5449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.504857 kernel: audit: type=1327 audit(1747442719.260:1390): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:19.504881 kernel: audit: type=1325 audit(1747442719.272:1391): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.230000 audit[5447]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffca0619f70 a2=0 a3=7ffca0619f5c items=0 ppid=2280 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:19.239000 audit[5447]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.239000 audit[5447]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffca0619f70 a2=0 a3=0 items=0 ppid=2280 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:19.260000 audit[5449]: NETFILTER_CFG table=filter:123 family=2 entries=36 op=nft_register_rule pid=5449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.260000 audit[5449]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffcb5413590 a2=0 a3=7ffcb541357c items=0 ppid=2280 pid=5449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:19.272000 audit[5449]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:19.272000 audit[5449]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcb5413590 a2=0 a3=0 items=0 ppid=2280 pid=5449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:19.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:20.361491 sshd[5432]: pam_unix(sshd:session): session closed for user core May 17 00:45:20.492544 systemd[1]: Started sshd@13-139.178.70.109:22-147.75.109.163:55178.service. May 17 00:45:20.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-147.75.109.163:55178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:20.502000 audit[5432]: USER_END pid=5432 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:20.503000 audit[5432]: CRED_DISP pid=5432 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:20.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.109:22-147.75.109.163:60394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:20.516664 systemd[1]: sshd@12-139.178.70.109:22-147.75.109.163:60394.service: Deactivated successfully. May 17 00:45:20.517483 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:45:20.520922 systemd-logind[1246]: Session 14 logged out. Waiting for processes to exit. May 17 00:45:20.523852 systemd-logind[1246]: Removed session 14. May 17 00:45:20.691000 audit[5451]: USER_ACCT pid=5451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:20.692735 sshd[5451]: Accepted publickey for core from 147.75.109.163 port 55178 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:45:20.692000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:20.692000 audit[5451]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb3aecf00 a2=3 a3=0 items=0 ppid=1 pid=5451 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:20.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:20.714467 sshd[5451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:20.790165 systemd[1]: Started session-15.scope. May 17 00:45:20.790505 systemd-logind[1246]: New session 15 of user core. May 17 00:45:20.792000 audit[5451]: USER_START pid=5451 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:20.798000 audit[5454]: CRED_ACQ pid=5454 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:24.071413 update_engine[1247]: I0517 00:45:24.066697 1247 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:45:24.253714 update_engine[1247]: I0517 00:45:24.093735 1247 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:45:24.253714 update_engine[1247]: E0517 00:45:24.095706 1247 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:45:24.253714 update_engine[1247]: I0517 00:45:24.095857 1247 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 17 00:45:26.255460 kubelet[2126]: E0517 00:45:26.253193 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rfqzj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-nwrcr_calico-system(53e1d52b-66eb-4d04-b85e-c5d1304df65c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:45:26.255460 kubelet[2126]: W0517 00:45:24.639692 2126 watcher.go:93] Error while processing event ("/sys/fs/cgroup/system.slice/system-sshd.slice/sshd@12-139.178.70.109:22-147.75.109.163:60394.service": 0x40000100 == IN_CREATE|IN_ISDIR): inotify_add_watch /sys/fs/cgroup/system.slice/system-sshd.slice/sshd@12-139.178.70.109:22-147.75.109.163:60394.service: no such file or directory May 17 00:45:26.297640 kubelet[2126]: W0517 00:45:26.297599 2126 watcher.go:93] Error while processing event ("/sys/fs/cgroup/user.slice/user-500.slice/session-14.scope": 0x40000100 == IN_CREATE|IN_ISDIR): inotify_add_watch /sys/fs/cgroup/user.slice/user-500.slice/session-14.scope: no such file or directory May 17 00:45:28.008667 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:45:28.063757 kernel: audit: type=1325 audit(1747442727.998:1401): table=filter:125 family=2 entries=24 op=nft_register_rule pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:28.069904 kernel: audit: type=1300 audit(1747442727.998:1401): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe869639a0 a2=0 a3=7ffe8696398c items=0 ppid=2280 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:28.069985 kernel: audit: type=1327 audit(1747442727.998:1401): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:28.071056 kernel: audit: type=1325 audit(1747442728.011:1402): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:28.071098 kernel: audit: type=1300 audit(1747442728.011:1402): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe869639a0 a2=0 a3=7ffe8696398c items=0 ppid=2280 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:28.076167 kernel: audit: type=1327 audit(1747442728.011:1402): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:27.998000 audit[5503]: NETFILTER_CFG table=filter:125 family=2 entries=24 op=nft_register_rule pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:27.998000 audit[5503]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe869639a0 a2=0 a3=7ffe8696398c items=0 ppid=2280 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:27.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:28.011000 audit[5503]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:28.011000 audit[5503]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe869639a0 a2=0 a3=7ffe8696398c items=0 ppid=2280 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:28.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:30.726374 kubelet[2126]: E0517 00:45:30.723761 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nwrcr" podUID="53e1d52b-66eb-4d04-b85e-c5d1304df65c" May 17 00:45:34.083096 update_engine[1247]: I0517 00:45:34.067021 1247 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:45:34.127896 update_engine[1247]: I0517 00:45:34.086263 1247 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:45:34.127896 update_engine[1247]: E0517 00:45:34.086519 1247 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:45:34.127896 update_engine[1247]: I0517 00:45:34.088815 1247 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 17 00:45:34.369867 sshd[5451]: pam_unix(sshd:session): session closed for user core May 17 00:45:34.394332 systemd[1]: Started sshd@14-139.178.70.109:22-147.75.109.163:60036.service. May 17 00:45:34.418982 kernel: audit: type=1130 audit(1747442734.396:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-147.75.109.163:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:34.419062 kernel: audit: type=1106 audit(1747442734.412:1404): pid=5451 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.419088 kernel: audit: type=1104 audit(1747442734.417:1405): pid=5451 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-147.75.109.163:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:34.412000 audit[5451]: USER_END pid=5451 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.417000 audit[5451]: CRED_DISP pid=5451 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-147.75.109.163:55178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:34.440739 kernel: audit: type=1131 audit(1747442734.435:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-147.75.109.163:55178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:34.436662 systemd[1]: sshd@13-139.178.70.109:22-147.75.109.163:55178.service: Deactivated successfully. May 17 00:45:34.440221 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:45:34.440325 systemd[1]: session-15.scope: Consumed 1.827s CPU time. May 17 00:45:34.441028 systemd-logind[1246]: Session 15 logged out. Waiting for processes to exit. May 17 00:45:34.441638 systemd-logind[1246]: Removed session 15. May 17 00:45:34.507000 audit[5532]: USER_ACCT pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.511945 sshd[5532]: Accepted publickey for core from 147.75.109.163 port 60036 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:45:34.512662 kernel: audit: type=1101 audit(1747442734.507:1407): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.511000 audit[5532]: CRED_ACQ pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.518065 kernel: audit: type=1103 audit(1747442734.511:1408): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.518120 kernel: audit: type=1006 audit(1747442734.511:1409): pid=5532 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:45:34.511000 audit[5532]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21f1ee10 a2=3 a3=0 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:34.533322 kernel: audit: type=1300 audit(1747442734.511:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21f1ee10 a2=3 a3=0 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:34.533399 kernel: audit: type=1327 audit(1747442734.511:1409): proctitle=737368643A20636F7265205B707269765D May 17 00:45:34.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:45:34.518860 sshd[5532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:45:34.573175 systemd-logind[1246]: New session 16 of user core. May 17 00:45:34.573800 systemd[1]: Started session-16.scope. May 17 00:45:34.578000 audit[5532]: USER_START pid=5532 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.584415 kernel: audit: type=1105 audit(1747442734.578:1410): pid=5532 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:34.583000 audit[5535]: CRED_ACQ pid=5535 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:37.233793 env[1255]: time="2025-05-17T00:45:37.231921321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:45:37.550788 env[1255]: time="2025-05-17T00:45:37.550692663Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:45:37.551356 env[1255]: time="2025-05-17T00:45:37.551332394Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:45:38.538846 kubelet[2126]: E0517 00:45:38.265616 2126 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:45:38.577755 kubelet[2126]: E0517 00:45:38.541280 2126 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:45:39.976680 kubelet[2126]: E0517 00:45:39.976632 2126 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vl28k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55cbb6f5c7-pnl7s_calico-system(de81bf95-10d0-45c0-abc5-41dac89311e0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:45:40.200159 kubelet[2126]: E0517 00:45:40.200109 2126 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55cbb6f5c7-pnl7s" podUID="de81bf95-10d0-45c0-abc5-41dac89311e0" May 17 00:45:40.271530 kubelet[2126]: E0517 00:45:40.271445 2126 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1m12.244s" May 17 00:45:41.659201 kubelet[2126]: E0517 00:45:41.602280 2126 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.107s" May 17 00:45:43.754000 audit[5548]: NETFILTER_CFG table=filter:127 family=2 entries=12 op=nft_register_rule pid=5548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:43.836442 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:45:43.841883 kernel: audit: type=1325 audit(1747442743.754:1412): table=filter:127 family=2 entries=12 op=nft_register_rule pid=5548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:43.842944 kernel: audit: type=1300 audit(1747442743.754:1412): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe194b7b50 a2=0 a3=7ffe194b7b3c items=0 ppid=2280 pid=5548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:43.842981 kernel: audit: type=1327 audit(1747442743.754:1412): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:43.843000 kernel: audit: type=1325 audit(1747442743.767:1413): table=nat:128 family=2 entries=82 op=nft_unregister_chain pid=5548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:43.843643 kernel: audit: type=1300 audit(1747442743.767:1413): arch=c000003e syscall=46 success=yes exit=24564 a0=3 a1=7ffe194b7b50 a2=0 a3=7ffe194b7b3c items=0 ppid=2280 pid=5548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:43.843666 kernel: audit: type=1327 audit(1747442743.767:1413): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:43.754000 audit[5548]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe194b7b50 a2=0 a3=7ffe194b7b3c items=0 ppid=2280 pid=5548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:43.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:43.767000 audit[5548]: NETFILTER_CFG table=nat:128 family=2 entries=82 op=nft_unregister_chain pid=5548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:45:43.767000 audit[5548]: SYSCALL arch=c000003e syscall=46 success=yes exit=24564 a0=3 a1=7ffe194b7b50 a2=0 a3=7ffe194b7b3c items=0 ppid=2280 pid=5548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:45:43.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:45:44.072000 update_engine[1247]: I0517 00:45:44.067081 1247 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:45:44.097662 update_engine[1247]: I0517 00:45:44.097546 1247 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:45:44.099819 update_engine[1247]: E0517 00:45:44.099802 1247 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:45:44.099871 update_engine[1247]: I0517 00:45:44.099858 1247 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 17 00:45:44.104665 update_engine[1247]: I0517 00:45:44.104611 1247 omaha_request_action.cc:621] Omaha request response: May 17 00:45:44.111679 update_engine[1247]: E0517 00:45:44.111609 1247 omaha_request_action.cc:640] Omaha request network transfer failed. May 17 00:45:44.111679 update_engine[1247]: I0517 00:45:44.111650 1247 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 17 00:45:44.111679 update_engine[1247]: I0517 00:45:44.111655 1247 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 17 00:45:44.111679 update_engine[1247]: I0517 00:45:44.111658 1247 update_attempter.cc:306] Processing Done. May 17 00:45:44.120795 update_engine[1247]: E0517 00:45:44.113217 1247 update_attempter.cc:619] Update failed. May 17 00:45:44.120795 update_engine[1247]: I0517 00:45:44.113226 1247 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 17 00:45:44.120795 update_engine[1247]: I0517 00:45:44.113229 1247 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 17 00:45:44.120795 update_engine[1247]: I0517 00:45:44.113231 1247 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 17 00:45:44.157342 update_engine[1247]: I0517 00:45:44.157280 1247 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160187 1247 omaha_request_action.cc:270] Posting an Omaha request to disabled May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160199 1247 omaha_request_action.cc:271] Request: May 17 00:45:44.160515 update_engine[1247]: May 17 00:45:44.160515 update_engine[1247]: May 17 00:45:44.160515 update_engine[1247]: May 17 00:45:44.160515 update_engine[1247]: May 17 00:45:44.160515 update_engine[1247]: May 17 00:45:44.160515 update_engine[1247]: May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160203 1247 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160344 1247 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 17 00:45:44.160515 update_engine[1247]: E0517 00:45:44.160424 1247 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160471 1247 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160477 1247 omaha_request_action.cc:621] Omaha request response: May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160480 1247 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160482 1247 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160485 1247 update_attempter.cc:306] Processing Done. May 17 00:45:44.160515 update_engine[1247]: I0517 00:45:44.160487 1247 update_attempter.cc:310] Error event sent. May 17 00:45:44.163279 update_engine[1247]: I0517 00:45:44.163218 1247 update_check_scheduler.cc:74] Next update check in 49m7s May 17 00:45:44.211606 locksmithd[1296]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 17 00:45:44.211940 locksmithd[1296]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 17 00:45:44.447885 sshd[5532]: pam_unix(sshd:session): session closed for user core May 17 00:45:44.469000 audit[5532]: USER_END pid=5532 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:44.479076 kernel: audit: type=1106 audit(1747442744.469:1414): pid=5532 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:44.479119 kernel: audit: type=1104 audit(1747442744.473:1415): pid=5532 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:44.473000 audit[5532]: CRED_DISP pid=5532 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:45:44.497292 systemd[1]: sshd@14-139.178.70.109:22-147.75.109.163:60036.service: Deactivated successfully. May 17 00:45:44.514392 kernel: audit: type=1131 audit(1747442744.502:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-147.75.109.163:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:44.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-147.75.109.163:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:45:44.510181 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:45:44.510327 systemd[1]: session-16.scope: Consumed 1.550s CPU time. May 17 00:45:44.514884 systemd-logind[1246]: Session 16 logged out. Waiting for processes to exit. May 17 00:45:44.527257 systemd-logind[1246]: Removed session 16.