May 17 00:39:30.996523 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:39:30.996553 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:39:30.996572 kernel: BIOS-provided physical RAM map: May 17 00:39:30.996583 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:39:30.996593 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 17 00:39:30.996604 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:39:30.996617 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:39:30.996629 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:39:30.996642 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:39:30.996654 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:39:30.996665 kernel: NX (Execute Disable) protection: active May 17 00:39:30.996676 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:39:30.996687 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:39:30.996699 kernel: extended physical RAM map: May 17 00:39:30.996716 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:39:30.996728 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 17 00:39:30.996740 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 17 00:39:30.996753 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 17 00:39:30.996765 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:39:30.996777 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:39:30.996789 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:39:30.996801 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:39:30.998865 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:39:30.998881 kernel: efi: EFI v2.70 by EDK II May 17 00:39:30.998899 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 17 00:39:30.998912 kernel: SMBIOS 2.7 present. May 17 00:39:30.998925 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 17 00:39:30.998938 kernel: Hypervisor detected: KVM May 17 00:39:30.998950 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:39:30.998963 kernel: kvm-clock: cpu 0, msr 2119a001, primary cpu clock May 17 00:39:30.998976 kernel: kvm-clock: using sched offset of 4203638252 cycles May 17 00:39:30.998990 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:39:30.999003 kernel: tsc: Detected 2500.008 MHz processor May 17 00:39:30.999016 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:39:30.999029 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:39:30.999045 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 17 00:39:30.999058 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:39:30.999071 kernel: Using GB pages for direct mapping May 17 00:39:30.999084 kernel: Secure boot disabled May 17 00:39:30.999098 kernel: ACPI: Early table checksum verification disabled May 17 00:39:30.999116 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 17 00:39:30.999130 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 17 00:39:30.999147 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 17 00:39:30.999161 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 17 00:39:30.999175 kernel: ACPI: FACS 0x00000000789D0000 000040 May 17 00:39:30.999189 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 17 00:39:30.999204 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 17 00:39:30.999218 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 17 00:39:30.999232 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 17 00:39:30.999249 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 17 00:39:30.999263 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:39:30.999277 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:39:30.999291 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 17 00:39:30.999305 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 17 00:39:30.999319 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 17 00:39:30.999333 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 17 00:39:30.999347 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 17 00:39:30.999361 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 17 00:39:30.999378 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 17 00:39:30.999392 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 17 00:39:30.999405 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 17 00:39:30.999419 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 17 00:39:30.999433 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 17 00:39:30.999447 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 17 00:39:30.999461 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:39:30.999475 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:39:30.999489 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 17 00:39:30.999507 kernel: NUMA: Initialized distance table, cnt=1 May 17 00:39:30.999520 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 17 00:39:30.999535 kernel: Zone ranges: May 17 00:39:30.999549 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:39:30.999564 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 17 00:39:30.999577 kernel: Normal empty May 17 00:39:30.999591 kernel: Movable zone start for each node May 17 00:39:30.999605 kernel: Early memory node ranges May 17 00:39:30.999619 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:39:30.999636 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 17 00:39:30.999650 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 17 00:39:30.999664 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 17 00:39:30.999679 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:39:30.999693 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:39:30.999707 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 17 00:39:30.999721 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 17 00:39:30.999735 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:39:30.999749 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:39:30.999765 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 17 00:39:30.999780 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:39:30.999794 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:39:30.999819 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:39:30.999833 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:39:30.999848 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:39:30.999862 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:39:30.999876 kernel: TSC deadline timer available May 17 00:39:30.999890 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:39:30.999907 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 17 00:39:30.999921 kernel: Booting paravirtualized kernel on KVM May 17 00:39:30.999935 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:39:30.999950 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:39:30.999963 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:39:30.999977 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:39:30.999992 kernel: pcpu-alloc: [0] 0 1 May 17 00:39:31.000006 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 17 00:39:31.000019 kernel: kvm-guest: PV spinlocks enabled May 17 00:39:31.000036 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:39:31.000051 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 17 00:39:31.000065 kernel: Policy zone: DMA32 May 17 00:39:31.000082 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:39:31.000097 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:39:31.000111 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:39:31.000125 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:39:31.000139 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:39:31.000156 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 160904K reserved, 0K cma-reserved) May 17 00:39:31.000170 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:39:31.000184 kernel: Kernel/User page tables isolation: enabled May 17 00:39:31.000198 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:39:31.000212 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:39:31.000227 kernel: rcu: Hierarchical RCU implementation. May 17 00:39:31.000242 kernel: rcu: RCU event tracing is enabled. May 17 00:39:31.000270 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:39:31.000284 kernel: Rude variant of Tasks RCU enabled. May 17 00:39:31.000296 kernel: Tracing variant of Tasks RCU enabled. May 17 00:39:31.000306 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:39:31.000318 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:39:31.000334 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:39:31.000347 kernel: random: crng init done May 17 00:39:31.000359 kernel: Console: colour dummy device 80x25 May 17 00:39:31.000372 kernel: printk: console [tty0] enabled May 17 00:39:31.000384 kernel: printk: console [ttyS0] enabled May 17 00:39:31.000396 kernel: ACPI: Core revision 20210730 May 17 00:39:31.000409 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 17 00:39:31.000426 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:39:31.000438 kernel: x2apic enabled May 17 00:39:31.000451 kernel: Switched APIC routing to physical x2apic. May 17 00:39:31.000463 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2409413c780, max_idle_ns: 440795222072 ns May 17 00:39:31.000476 kernel: Calibrating delay loop (skipped) preset value.. 5000.01 BogoMIPS (lpj=2500008) May 17 00:39:31.000489 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:39:31.000502 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:39:31.000519 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:39:31.000531 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:39:31.000544 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:39:31.000556 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:39:31.000569 kernel: RETBleed: Vulnerable May 17 00:39:31.000582 kernel: Speculative Store Bypass: Vulnerable May 17 00:39:31.000594 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:39:31.000606 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:39:31.000618 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:39:31.000630 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:39:31.000643 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:39:31.000657 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:39:31.000671 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 17 00:39:31.000683 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 17 00:39:31.000696 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:39:31.000709 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:39:31.000721 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:39:31.000733 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 17 00:39:31.000746 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:39:31.000758 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 17 00:39:31.000771 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 17 00:39:31.000783 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 17 00:39:31.000797 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 17 00:39:31.000820 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 17 00:39:31.000832 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 17 00:39:31.000844 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 17 00:39:31.000856 kernel: Freeing SMP alternatives memory: 32K May 17 00:39:31.000868 kernel: pid_max: default: 32768 minimum: 301 May 17 00:39:31.000881 kernel: LSM: Security Framework initializing May 17 00:39:31.000893 kernel: SELinux: Initializing. May 17 00:39:31.000906 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:39:31.000919 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:39:31.000932 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:39:31.000947 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:39:31.000960 kernel: signal: max sigframe size: 3632 May 17 00:39:31.000972 kernel: rcu: Hierarchical SRCU implementation. May 17 00:39:31.000985 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:39:31.000998 kernel: smp: Bringing up secondary CPUs ... May 17 00:39:31.001011 kernel: x86: Booting SMP configuration: May 17 00:39:31.001023 kernel: .... node #0, CPUs: #1 May 17 00:39:31.001038 kernel: kvm-clock: cpu 1, msr 2119a041, secondary cpu clock May 17 00:39:31.001051 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 17 00:39:31.001067 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:39:31.001080 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:39:31.001093 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:39:31.001106 kernel: smpboot: Max logical packages: 1 May 17 00:39:31.001119 kernel: smpboot: Total of 2 processors activated (10000.03 BogoMIPS) May 17 00:39:31.001132 kernel: devtmpfs: initialized May 17 00:39:31.001145 kernel: x86/mm: Memory block size: 128MB May 17 00:39:31.001158 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 17 00:39:31.001171 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:39:31.001186 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:39:31.001199 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:39:31.001212 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:39:31.001224 kernel: audit: initializing netlink subsys (disabled) May 17 00:39:31.001235 kernel: audit: type=2000 audit(1747442370.740:1): state=initialized audit_enabled=0 res=1 May 17 00:39:31.001247 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:39:31.001260 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:39:31.001272 kernel: cpuidle: using governor menu May 17 00:39:31.001284 kernel: ACPI: bus type PCI registered May 17 00:39:31.001300 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:39:31.001313 kernel: dca service started, version 1.12.1 May 17 00:39:31.001326 kernel: PCI: Using configuration type 1 for base access May 17 00:39:31.001339 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:39:31.001352 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:39:31.001365 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:39:31.001384 kernel: ACPI: Added _OSI(Module Device) May 17 00:39:31.001396 kernel: ACPI: Added _OSI(Processor Device) May 17 00:39:31.001409 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:39:31.001424 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:39:31.001438 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:39:31.001450 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:39:31.001462 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:39:31.001475 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:39:31.001488 kernel: ACPI: Interpreter enabled May 17 00:39:31.001501 kernel: ACPI: PM: (supports S0 S5) May 17 00:39:31.001514 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:39:31.001527 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:39:31.001542 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:39:31.001555 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:39:31.001753 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:39:31.001888 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:39:31.001904 kernel: acpiphp: Slot [3] registered May 17 00:39:31.001917 kernel: acpiphp: Slot [4] registered May 17 00:39:31.001929 kernel: acpiphp: Slot [5] registered May 17 00:39:31.001945 kernel: acpiphp: Slot [6] registered May 17 00:39:31.001958 kernel: acpiphp: Slot [7] registered May 17 00:39:31.001972 kernel: acpiphp: Slot [8] registered May 17 00:39:31.001984 kernel: acpiphp: Slot [9] registered May 17 00:39:31.001996 kernel: acpiphp: Slot [10] registered May 17 00:39:31.002009 kernel: acpiphp: Slot [11] registered May 17 00:39:31.002021 kernel: acpiphp: Slot [12] registered May 17 00:39:31.002034 kernel: acpiphp: Slot [13] registered May 17 00:39:31.002046 kernel: acpiphp: Slot [14] registered May 17 00:39:31.002059 kernel: acpiphp: Slot [15] registered May 17 00:39:31.002073 kernel: acpiphp: Slot [16] registered May 17 00:39:31.002085 kernel: acpiphp: Slot [17] registered May 17 00:39:31.002097 kernel: acpiphp: Slot [18] registered May 17 00:39:31.002109 kernel: acpiphp: Slot [19] registered May 17 00:39:31.002122 kernel: acpiphp: Slot [20] registered May 17 00:39:31.002134 kernel: acpiphp: Slot [21] registered May 17 00:39:31.002146 kernel: acpiphp: Slot [22] registered May 17 00:39:31.002159 kernel: acpiphp: Slot [23] registered May 17 00:39:31.002171 kernel: acpiphp: Slot [24] registered May 17 00:39:31.002186 kernel: acpiphp: Slot [25] registered May 17 00:39:31.002199 kernel: acpiphp: Slot [26] registered May 17 00:39:31.002211 kernel: acpiphp: Slot [27] registered May 17 00:39:31.002223 kernel: acpiphp: Slot [28] registered May 17 00:39:31.002236 kernel: acpiphp: Slot [29] registered May 17 00:39:31.002248 kernel: acpiphp: Slot [30] registered May 17 00:39:31.002261 kernel: acpiphp: Slot [31] registered May 17 00:39:31.002274 kernel: PCI host bridge to bus 0000:00 May 17 00:39:31.002391 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:39:31.002501 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:39:31.002606 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:39:31.002710 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:39:31.012844 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 17 00:39:31.013035 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:39:31.013186 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:39:31.013315 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:39:31.013460 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 17 00:39:31.013578 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:39:31.013692 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 17 00:39:31.013818 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 17 00:39:31.013936 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 17 00:39:31.014050 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 17 00:39:31.014168 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 17 00:39:31.014284 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 17 00:39:31.014404 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 17 00:39:31.014518 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 17 00:39:31.014634 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 17 00:39:31.014748 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 17 00:39:31.014876 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:39:31.015013 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 17 00:39:31.015135 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 17 00:39:31.015268 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 17 00:39:31.015387 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 17 00:39:31.015406 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:39:31.015421 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:39:31.015436 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:39:31.015454 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:39:31.015469 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:39:31.015483 kernel: iommu: Default domain type: Translated May 17 00:39:31.015497 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:39:31.015872 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 17 00:39:31.016025 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:39:31.016164 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 17 00:39:31.016184 kernel: vgaarb: loaded May 17 00:39:31.016201 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:39:31.016222 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:39:31.016237 kernel: PTP clock support registered May 17 00:39:31.016252 kernel: Registered efivars operations May 17 00:39:31.016267 kernel: PCI: Using ACPI for IRQ routing May 17 00:39:31.016282 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:39:31.016298 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 17 00:39:31.016313 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 17 00:39:31.016327 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 17 00:39:31.016342 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 17 00:39:31.016360 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 17 00:39:31.016375 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:39:31.016391 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:39:31.016406 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:39:31.016420 kernel: pnp: PnP ACPI init May 17 00:39:31.016435 kernel: pnp: PnP ACPI: found 5 devices May 17 00:39:31.016450 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:39:31.016466 kernel: NET: Registered PF_INET protocol family May 17 00:39:31.016481 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:39:31.016500 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:39:31.016515 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:39:31.016530 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:39:31.016545 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:39:31.016560 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:39:31.016575 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:39:31.016590 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:39:31.016605 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:39:31.016623 kernel: NET: Registered PF_XDP protocol family May 17 00:39:31.016759 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:39:31.016906 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:39:31.017032 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:39:31.017156 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:39:31.017282 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 17 00:39:31.017434 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:39:31.017594 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:39:31.017619 kernel: PCI: CLS 0 bytes, default 64 May 17 00:39:31.017635 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:39:31.017650 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2409413c780, max_idle_ns: 440795222072 ns May 17 00:39:31.017665 kernel: clocksource: Switched to clocksource tsc May 17 00:39:31.017680 kernel: Initialise system trusted keyrings May 17 00:39:31.017695 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:39:31.017710 kernel: Key type asymmetric registered May 17 00:39:31.017724 kernel: Asymmetric key parser 'x509' registered May 17 00:39:31.017739 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:39:31.017756 kernel: io scheduler mq-deadline registered May 17 00:39:31.017770 kernel: io scheduler kyber registered May 17 00:39:31.017785 kernel: io scheduler bfq registered May 17 00:39:31.017800 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:39:31.017828 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:39:31.017843 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:39:31.017858 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:39:31.017873 kernel: i8042: Warning: Keylock active May 17 00:39:31.017887 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:39:31.017905 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:39:31.018045 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:39:31.018163 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:39:31.018278 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:39:30 UTC (1747442370) May 17 00:39:31.018394 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:39:31.018412 kernel: intel_pstate: CPU model not supported May 17 00:39:31.018427 kernel: efifb: probing for efifb May 17 00:39:31.018442 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 17 00:39:31.018460 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 17 00:39:31.018475 kernel: efifb: scrolling: redraw May 17 00:39:31.018490 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:39:31.018505 kernel: Console: switching to colour frame buffer device 100x37 May 17 00:39:31.018519 kernel: fb0: EFI VGA frame buffer device May 17 00:39:31.018535 kernel: pstore: Registered efi as persistent store backend May 17 00:39:31.018572 kernel: NET: Registered PF_INET6 protocol family May 17 00:39:31.018590 kernel: Segment Routing with IPv6 May 17 00:39:31.018606 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:39:31.018625 kernel: NET: Registered PF_PACKET protocol family May 17 00:39:31.018640 kernel: Key type dns_resolver registered May 17 00:39:31.018655 kernel: IPI shorthand broadcast: enabled May 17 00:39:31.018673 kernel: sched_clock: Marking stable (357071933, 133267482)->(555975847, -65636432) May 17 00:39:31.018688 kernel: registered taskstats version 1 May 17 00:39:31.018704 kernel: Loading compiled-in X.509 certificates May 17 00:39:31.018719 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:39:31.018735 kernel: Key type .fscrypt registered May 17 00:39:31.018750 kernel: Key type fscrypt-provisioning registered May 17 00:39:31.018769 kernel: pstore: Using crash dump compression: deflate May 17 00:39:31.018784 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:39:31.018800 kernel: ima: Allocated hash algorithm: sha1 May 17 00:39:31.018839 kernel: ima: No architecture policies found May 17 00:39:31.018854 kernel: clk: Disabling unused clocks May 17 00:39:31.018870 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:39:31.018886 kernel: Write protecting the kernel read-only data: 28672k May 17 00:39:31.018902 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:39:31.018918 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:39:31.018937 kernel: Run /init as init process May 17 00:39:31.018953 kernel: with arguments: May 17 00:39:31.018969 kernel: /init May 17 00:39:31.018984 kernel: with environment: May 17 00:39:31.019000 kernel: HOME=/ May 17 00:39:31.019015 kernel: TERM=linux May 17 00:39:31.019031 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:39:31.019051 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:39:31.019073 systemd[1]: Detected virtualization amazon. May 17 00:39:31.019090 systemd[1]: Detected architecture x86-64. May 17 00:39:31.019106 systemd[1]: Running in initrd. May 17 00:39:31.019122 systemd[1]: No hostname configured, using default hostname. May 17 00:39:31.019138 systemd[1]: Hostname set to . May 17 00:39:31.019155 systemd[1]: Initializing machine ID from VM UUID. May 17 00:39:31.019171 systemd[1]: Queued start job for default target initrd.target. May 17 00:39:31.019190 systemd[1]: Started systemd-ask-password-console.path. May 17 00:39:31.019209 systemd[1]: Reached target cryptsetup.target. May 17 00:39:31.019225 systemd[1]: Reached target paths.target. May 17 00:39:31.019240 systemd[1]: Reached target slices.target. May 17 00:39:31.019256 systemd[1]: Reached target swap.target. May 17 00:39:31.019272 systemd[1]: Reached target timers.target. May 17 00:39:31.019292 systemd[1]: Listening on iscsid.socket. May 17 00:39:31.019309 systemd[1]: Listening on iscsiuio.socket. May 17 00:39:31.019325 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:39:31.019341 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:39:31.019357 systemd[1]: Listening on systemd-journald.socket. May 17 00:39:31.019374 systemd[1]: Listening on systemd-networkd.socket. May 17 00:39:31.019390 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:39:31.019409 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:39:31.019426 systemd[1]: Reached target sockets.target. May 17 00:39:31.019442 systemd[1]: Starting kmod-static-nodes.service... May 17 00:39:31.019459 systemd[1]: Finished network-cleanup.service. May 17 00:39:31.019475 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:39:31.019491 systemd[1]: Starting systemd-journald.service... May 17 00:39:31.019507 systemd[1]: Starting systemd-modules-load.service... May 17 00:39:31.019523 systemd[1]: Starting systemd-resolved.service... May 17 00:39:31.019540 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:39:31.019559 systemd[1]: Finished kmod-static-nodes.service. May 17 00:39:31.019576 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:39:31.019593 kernel: audit: type=1130 audit(1747442370.996:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.019609 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:39:31.019625 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:39:31.019642 kernel: audit: type=1130 audit(1747442371.008:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.019670 systemd-journald[185]: Journal started May 17 00:39:31.019747 systemd-journald[185]: Runtime Journal (/run/log/journal/ec242a8e698d009c8061a9ec904a1d51) is 4.8M, max 38.3M, 33.5M free. May 17 00:39:30.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.015647 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:39:31.030023 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:39:31.034410 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:39:31.045831 systemd[1]: Started systemd-journald.service. May 17 00:39:31.047034 systemd-resolved[187]: Positive Trust Anchors: May 17 00:39:31.048325 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:39:31.050439 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:39:31.059689 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:39:31.068976 kernel: audit: type=1130 audit(1747442371.059:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.066936 systemd[1]: Started systemd-resolved.service. May 17 00:39:31.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.071036 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:39:31.077845 kernel: audit: type=1130 audit(1747442371.069:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.079351 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:39:31.080605 systemd[1]: Reached target nss-lookup.target. May 17 00:39:31.085109 systemd[1]: Starting dracut-cmdline.service... May 17 00:39:31.093871 kernel: audit: type=1130 audit(1747442371.078:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.101527 kernel: audit: type=1130 audit(1747442371.079:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.107837 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:39:31.109748 dracut-cmdline[201]: dracut-dracut-053 May 17 00:39:31.114268 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:39:31.125769 kernel: Bridge firewalling registered May 17 00:39:31.114944 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:39:31.145837 kernel: SCSI subsystem initialized May 17 00:39:31.166326 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:39:31.166396 kernel: device-mapper: uevent: version 1.0.3 May 17 00:39:31.168825 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:39:31.173313 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:39:31.175586 systemd[1]: Finished systemd-modules-load.service. May 17 00:39:31.183885 kernel: audit: type=1130 audit(1747442371.175:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.178662 systemd[1]: Starting systemd-sysctl.service... May 17 00:39:31.196590 systemd[1]: Finished systemd-sysctl.service. May 17 00:39:31.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.205844 kernel: audit: type=1130 audit(1747442371.198:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.213836 kernel: Loading iSCSI transport class v2.0-870. May 17 00:39:31.232835 kernel: iscsi: registered transport (tcp) May 17 00:39:31.257913 kernel: iscsi: registered transport (qla4xxx) May 17 00:39:31.257997 kernel: QLogic iSCSI HBA Driver May 17 00:39:31.289850 systemd[1]: Finished dracut-cmdline.service. May 17 00:39:31.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.297846 kernel: audit: type=1130 audit(1747442371.289:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.296581 systemd[1]: Starting dracut-pre-udev.service... May 17 00:39:31.347835 kernel: raid6: avx512x4 gen() 18023 MB/s May 17 00:39:31.365836 kernel: raid6: avx512x4 xor() 8266 MB/s May 17 00:39:31.383833 kernel: raid6: avx512x2 gen() 17894 MB/s May 17 00:39:31.401835 kernel: raid6: avx512x2 xor() 24133 MB/s May 17 00:39:31.419831 kernel: raid6: avx512x1 gen() 17931 MB/s May 17 00:39:31.437838 kernel: raid6: avx512x1 xor() 21722 MB/s May 17 00:39:31.455827 kernel: raid6: avx2x4 gen() 17865 MB/s May 17 00:39:31.474846 kernel: raid6: avx2x4 xor() 3099 MB/s May 17 00:39:31.493936 kernel: raid6: avx2x2 gen() 9033 MB/s May 17 00:39:31.511843 kernel: raid6: avx2x2 xor() 9281 MB/s May 17 00:39:31.530842 kernel: raid6: avx2x1 gen() 7502 MB/s May 17 00:39:31.548836 kernel: raid6: avx2x1 xor() 10112 MB/s May 17 00:39:31.566829 kernel: raid6: sse2x4 gen() 9508 MB/s May 17 00:39:31.584829 kernel: raid6: sse2x4 xor() 6033 MB/s May 17 00:39:31.602828 kernel: raid6: sse2x2 gen() 10524 MB/s May 17 00:39:31.620831 kernel: raid6: sse2x2 xor() 6236 MB/s May 17 00:39:31.638828 kernel: raid6: sse2x1 gen() 9395 MB/s May 17 00:39:31.656995 kernel: raid6: sse2x1 xor() 4885 MB/s May 17 00:39:31.657041 kernel: raid6: using algorithm avx512x4 gen() 18023 MB/s May 17 00:39:31.657061 kernel: raid6: .... xor() 8266 MB/s, rmw enabled May 17 00:39:31.658086 kernel: raid6: using avx512x2 recovery algorithm May 17 00:39:31.672839 kernel: xor: automatically using best checksumming function avx May 17 00:39:31.775839 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:39:31.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.784000 audit: BPF prog-id=7 op=LOAD May 17 00:39:31.784000 audit: BPF prog-id=8 op=LOAD May 17 00:39:31.784695 systemd[1]: Finished dracut-pre-udev.service. May 17 00:39:31.786106 systemd[1]: Starting systemd-udevd.service... May 17 00:39:31.799877 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:39:31.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.805189 systemd[1]: Started systemd-udevd.service. May 17 00:39:31.809019 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:39:31.827914 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation May 17 00:39:31.858962 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:39:31.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.860533 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:39:31.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:31.903233 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:39:31.958834 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:39:31.996316 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:39:31.996394 kernel: AES CTR mode by8 optimization enabled May 17 00:39:32.004012 kernel: nvme nvme0: pci function 0000:00:04.0 May 17 00:39:32.004275 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:39:32.004295 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 17 00:39:32.023229 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 17 00:39:32.023402 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 17 00:39:32.023550 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 17 00:39:32.023693 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:99:ac:86:1d:bb May 17 00:39:32.023845 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:39:32.026333 kernel: GPT:9289727 != 16777215 May 17 00:39:32.026382 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:39:32.028663 kernel: GPT:9289727 != 16777215 May 17 00:39:32.028710 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:39:32.031069 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:39:32.034500 (udev-worker)[440]: Network interface NamePolicy= disabled on kernel command line. May 17 00:39:32.108836 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (434) May 17 00:39:32.152263 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:39:32.185610 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:39:32.191213 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:39:32.191939 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:39:32.198616 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:39:32.200419 systemd[1]: Starting disk-uuid.service... May 17 00:39:32.207169 disk-uuid[593]: Primary Header is updated. May 17 00:39:32.207169 disk-uuid[593]: Secondary Entries is updated. May 17 00:39:32.207169 disk-uuid[593]: Secondary Header is updated. May 17 00:39:32.215888 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:39:33.225201 disk-uuid[594]: The operation has completed successfully. May 17 00:39:33.226308 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:39:33.353124 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:39:33.353239 systemd[1]: Finished disk-uuid.service. May 17 00:39:33.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.360065 systemd[1]: Starting verity-setup.service... May 17 00:39:33.388166 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:39:33.466093 systemd[1]: Found device dev-mapper-usr.device. May 17 00:39:33.468123 systemd[1]: Mounting sysusr-usr.mount... May 17 00:39:33.471710 systemd[1]: Finished verity-setup.service. May 17 00:39:33.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.561835 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:39:33.562276 systemd[1]: Mounted sysusr-usr.mount. May 17 00:39:33.563114 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:39:33.564142 systemd[1]: Starting ignition-setup.service... May 17 00:39:33.569072 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:39:33.594372 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:39:33.594445 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:39:33.594465 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:39:33.620835 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:39:33.639088 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:39:33.650780 systemd[1]: Finished ignition-setup.service. May 17 00:39:33.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.652267 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:39:33.655262 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:39:33.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.656000 audit: BPF prog-id=9 op=LOAD May 17 00:39:33.657689 systemd[1]: Starting systemd-networkd.service... May 17 00:39:33.680781 systemd-networkd[1107]: lo: Link UP May 17 00:39:33.680795 systemd-networkd[1107]: lo: Gained carrier May 17 00:39:33.681497 systemd-networkd[1107]: Enumeration completed May 17 00:39:33.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.681617 systemd[1]: Started systemd-networkd.service. May 17 00:39:33.681946 systemd-networkd[1107]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:39:33.684313 systemd[1]: Reached target network.target. May 17 00:39:33.686303 systemd-networkd[1107]: eth0: Link UP May 17 00:39:33.686308 systemd-networkd[1107]: eth0: Gained carrier May 17 00:39:33.688914 systemd[1]: Starting iscsiuio.service... May 17 00:39:33.696251 systemd[1]: Started iscsiuio.service. May 17 00:39:33.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.698045 systemd[1]: Starting iscsid.service... May 17 00:39:33.699988 systemd-networkd[1107]: eth0: DHCPv4 address 172.31.25.158/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:39:33.703977 iscsid[1112]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:39:33.703977 iscsid[1112]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:39:33.703977 iscsid[1112]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:39:33.703977 iscsid[1112]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:39:33.703977 iscsid[1112]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:39:33.703977 iscsid[1112]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:39:33.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.705045 systemd[1]: Started iscsid.service. May 17 00:39:33.707624 systemd[1]: Starting dracut-initqueue.service... May 17 00:39:33.723730 systemd[1]: Finished dracut-initqueue.service. May 17 00:39:33.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:33.724518 systemd[1]: Reached target remote-fs-pre.target. May 17 00:39:33.725717 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:39:33.726890 systemd[1]: Reached target remote-fs.target. May 17 00:39:33.729269 systemd[1]: Starting dracut-pre-mount.service... May 17 00:39:33.738911 systemd[1]: Finished dracut-pre-mount.service. May 17 00:39:33.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.164624 ignition[1106]: Ignition 2.14.0 May 17 00:39:34.164638 ignition[1106]: Stage: fetch-offline May 17 00:39:34.164754 ignition[1106]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:34.164795 ignition[1106]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:34.184741 ignition[1106]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:34.185094 ignition[1106]: Ignition finished successfully May 17 00:39:34.186829 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:39:34.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.188795 systemd[1]: Starting ignition-fetch.service... May 17 00:39:34.198271 ignition[1131]: Ignition 2.14.0 May 17 00:39:34.198283 ignition[1131]: Stage: fetch May 17 00:39:34.198476 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:34.198510 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:34.207269 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:34.208367 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:34.217005 ignition[1131]: INFO : PUT result: OK May 17 00:39:34.218876 ignition[1131]: DEBUG : parsed url from cmdline: "" May 17 00:39:34.218876 ignition[1131]: INFO : no config URL provided May 17 00:39:34.218876 ignition[1131]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 17 00:39:34.218876 ignition[1131]: INFO : no config at "/usr/lib/ignition/user.ign" May 17 00:39:34.222397 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:34.222397 ignition[1131]: INFO : PUT result: OK May 17 00:39:34.222397 ignition[1131]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 17 00:39:34.222397 ignition[1131]: INFO : GET result: OK May 17 00:39:34.222397 ignition[1131]: DEBUG : parsing config with SHA512: 139d6c3fc861f38398bd5098ecc805c4f0f2f4f44e67147040d4788d0c8125f5265211083050e782253459816804f16e7c3cded65ce8bf2b530effa37013b685 May 17 00:39:34.225445 unknown[1131]: fetched base config from "system" May 17 00:39:34.225462 unknown[1131]: fetched base config from "system" May 17 00:39:34.225558 unknown[1131]: fetched user config from "aws" May 17 00:39:34.234155 ignition[1131]: fetch: fetch complete May 17 00:39:34.234169 ignition[1131]: fetch: fetch passed May 17 00:39:34.234248 ignition[1131]: Ignition finished successfully May 17 00:39:34.236202 systemd[1]: Finished ignition-fetch.service. May 17 00:39:34.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.238257 systemd[1]: Starting ignition-kargs.service... May 17 00:39:34.248697 ignition[1137]: Ignition 2.14.0 May 17 00:39:34.248710 ignition[1137]: Stage: kargs May 17 00:39:34.248961 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:34.248994 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:34.256301 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:34.257145 ignition[1137]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:34.257964 ignition[1137]: INFO : PUT result: OK May 17 00:39:34.259707 ignition[1137]: kargs: kargs passed May 17 00:39:34.259773 ignition[1137]: Ignition finished successfully May 17 00:39:34.261082 systemd[1]: Finished ignition-kargs.service. May 17 00:39:34.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.263007 systemd[1]: Starting ignition-disks.service... May 17 00:39:34.272154 ignition[1143]: Ignition 2.14.0 May 17 00:39:34.272167 ignition[1143]: Stage: disks May 17 00:39:34.272375 ignition[1143]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:34.272407 ignition[1143]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:34.279526 ignition[1143]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:34.280398 ignition[1143]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:34.281020 ignition[1143]: INFO : PUT result: OK May 17 00:39:34.285879 ignition[1143]: disks: disks passed May 17 00:39:34.285956 ignition[1143]: Ignition finished successfully May 17 00:39:34.287207 systemd[1]: Finished ignition-disks.service. May 17 00:39:34.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.288201 systemd[1]: Reached target initrd-root-device.target. May 17 00:39:34.289085 systemd[1]: Reached target local-fs-pre.target. May 17 00:39:34.290137 systemd[1]: Reached target local-fs.target. May 17 00:39:34.291051 systemd[1]: Reached target sysinit.target. May 17 00:39:34.291957 systemd[1]: Reached target basic.target. May 17 00:39:34.294146 systemd[1]: Starting systemd-fsck-root.service... May 17 00:39:34.323108 systemd-fsck[1151]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:39:34.328188 systemd[1]: Finished systemd-fsck-root.service. May 17 00:39:34.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.329676 systemd[1]: Mounting sysroot.mount... May 17 00:39:34.351435 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:39:34.351615 systemd[1]: Mounted sysroot.mount. May 17 00:39:34.352326 systemd[1]: Reached target initrd-root-fs.target. May 17 00:39:34.355451 systemd[1]: Mounting sysroot-usr.mount... May 17 00:39:34.356849 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:39:34.356903 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:39:34.356933 systemd[1]: Reached target ignition-diskful.target. May 17 00:39:34.361270 systemd[1]: Mounted sysroot-usr.mount. May 17 00:39:34.364530 systemd[1]: Starting initrd-setup-root.service... May 17 00:39:34.370194 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:39:34.395383 initrd-setup-root[1180]: cut: /sysroot/etc/group: No such file or directory May 17 00:39:34.399708 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:39:34.403594 initrd-setup-root[1196]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:39:34.499649 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:39:34.521834 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1204) May 17 00:39:34.525280 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:39:34.525347 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:39:34.525360 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:39:34.548850 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:39:34.558981 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:39:34.561720 systemd[1]: Finished initrd-setup-root.service. May 17 00:39:34.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.563663 systemd[1]: Starting ignition-mount.service... May 17 00:39:34.566755 systemd[1]: Starting sysroot-boot.service... May 17 00:39:34.571248 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:39:34.571352 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:39:34.593423 ignition[1233]: INFO : Ignition 2.14.0 May 17 00:39:34.593423 ignition[1233]: INFO : Stage: mount May 17 00:39:34.596506 ignition[1233]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:34.596506 ignition[1233]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:34.605850 ignition[1233]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:34.607219 ignition[1233]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:34.608970 ignition[1233]: INFO : PUT result: OK May 17 00:39:34.612944 ignition[1233]: INFO : mount: mount passed May 17 00:39:34.613926 ignition[1233]: INFO : Ignition finished successfully May 17 00:39:34.614535 systemd[1]: Finished ignition-mount.service. May 17 00:39:34.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.616613 systemd[1]: Starting ignition-files.service... May 17 00:39:34.627359 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:39:34.631882 systemd[1]: Finished sysroot-boot.service. May 17 00:39:34.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:34.646843 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1243) May 17 00:39:34.646914 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:39:34.649782 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:39:34.649842 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:39:34.665855 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:39:34.669239 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:39:34.680029 ignition[1262]: INFO : Ignition 2.14.0 May 17 00:39:34.680029 ignition[1262]: INFO : Stage: files May 17 00:39:34.682472 ignition[1262]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:34.682472 ignition[1262]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:34.690107 ignition[1262]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:34.691044 ignition[1262]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:34.691044 ignition[1262]: INFO : PUT result: OK May 17 00:39:34.694533 ignition[1262]: DEBUG : files: compiled without relabeling support, skipping May 17 00:39:34.699859 ignition[1262]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:39:34.699859 ignition[1262]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:39:34.714409 ignition[1262]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:39:34.715626 ignition[1262]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:39:34.716708 ignition[1262]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:39:34.715978 unknown[1262]: wrote ssh authorized keys file for user: core May 17 00:39:34.718742 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:39:34.718742 ignition[1262]: INFO : GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 17 00:39:34.833868 ignition[1262]: INFO : GET result: OK May 17 00:39:35.085936 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:39:35.087360 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:39:35.088653 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:39:35.092055 ignition[1262]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2724675558" May 17 00:39:35.093609 ignition[1262]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2724675558": device or resource busy May 17 00:39:35.093609 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2724675558", trying btrfs: device or resource busy May 17 00:39:35.093609 ignition[1262]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2724675558" May 17 00:39:35.093609 ignition[1262]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2724675558" May 17 00:39:35.096006 systemd-networkd[1107]: eth0: Gained IPv6LL May 17 00:39:35.104213 ignition[1262]: INFO : op(3): [started] unmounting "/mnt/oem2724675558" May 17 00:39:35.105021 ignition[1262]: INFO : op(3): [finished] unmounting "/mnt/oem2724675558" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:39:35.105021 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:39:35.117986 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:39:35.117986 ignition[1262]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1134189683" May 17 00:39:35.117986 ignition[1262]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1134189683": device or resource busy May 17 00:39:35.117986 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1134189683", trying btrfs: device or resource busy May 17 00:39:35.117986 ignition[1262]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1134189683" May 17 00:39:35.117986 ignition[1262]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1134189683" May 17 00:39:35.117986 ignition[1262]: INFO : op(6): [started] unmounting "/mnt/oem1134189683" May 17 00:39:35.117986 ignition[1262]: INFO : op(6): [finished] unmounting "/mnt/oem1134189683" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:39:35.117986 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:39:35.117986 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:39:35.141468 ignition[1262]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem270220314" May 17 00:39:35.141468 ignition[1262]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem270220314": device or resource busy May 17 00:39:35.141468 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem270220314", trying btrfs: device or resource busy May 17 00:39:35.141468 ignition[1262]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem270220314" May 17 00:39:35.141468 ignition[1262]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem270220314" May 17 00:39:35.141468 ignition[1262]: INFO : op(9): [started] unmounting "/mnt/oem270220314" May 17 00:39:35.141468 ignition[1262]: INFO : op(9): [finished] unmounting "/mnt/oem270220314" May 17 00:39:35.141468 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:39:35.141468 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:39:35.141468 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:39:35.141468 ignition[1262]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem985271652" May 17 00:39:35.141468 ignition[1262]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem985271652": device or resource busy May 17 00:39:35.141468 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem985271652", trying btrfs: device or resource busy May 17 00:39:35.141468 ignition[1262]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem985271652" May 17 00:39:35.141468 ignition[1262]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem985271652" May 17 00:39:35.141468 ignition[1262]: INFO : op(c): [started] unmounting "/mnt/oem985271652" May 17 00:39:35.141468 ignition[1262]: INFO : op(c): [finished] unmounting "/mnt/oem985271652" May 17 00:39:35.141468 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:39:35.141468 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:39:35.141468 ignition[1262]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:39:36.041643 ignition[1262]: INFO : GET result: OK May 17 00:39:36.524508 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:39:36.524508 ignition[1262]: INFO : files: op(f): [started] processing unit "nvidia.service" May 17 00:39:36.524508 ignition[1262]: INFO : files: op(f): [finished] processing unit "nvidia.service" May 17 00:39:36.524508 ignition[1262]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:39:36.524508 ignition[1262]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:39:36.524508 ignition[1262]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" May 17 00:39:36.551383 kernel: kauditd_printk_skb: 25 callbacks suppressed May 17 00:39:36.551424 kernel: audit: type=1130 audit(1747442376.534:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.533920 systemd[1]: Finished ignition-files.service. May 17 00:39:36.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.560241 ignition[1262]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(13): [started] processing unit "prepare-helm.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(15): [started] setting preset to enabled for "nvidia.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(15): [finished] setting preset to enabled for "nvidia.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:39:36.560241 ignition[1262]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:39:36.560241 ignition[1262]: INFO : files: op(17): [started] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:39:36.560241 ignition[1262]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:39:36.560241 ignition[1262]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:39:36.560241 ignition[1262]: INFO : files: files passed May 17 00:39:36.560241 ignition[1262]: INFO : Ignition finished successfully May 17 00:39:36.627633 kernel: audit: type=1130 audit(1747442376.554:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.627673 kernel: audit: type=1131 audit(1747442376.559:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.627694 kernel: audit: type=1130 audit(1747442376.566:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.627715 kernel: audit: type=1130 audit(1747442376.598:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.627735 kernel: audit: type=1131 audit(1747442376.598:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.544346 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:39:36.546724 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:39:36.631881 initrd-setup-root-after-ignition[1287]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:39:36.547843 systemd[1]: Starting ignition-quench.service... May 17 00:39:36.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.553369 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:39:36.643270 kernel: audit: type=1130 audit(1747442376.633:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.553502 systemd[1]: Finished ignition-quench.service. May 17 00:39:36.560404 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:39:36.567288 systemd[1]: Reached target ignition-complete.target. May 17 00:39:36.576189 systemd[1]: Starting initrd-parse-etc.service... May 17 00:39:36.598639 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:39:36.598765 systemd[1]: Finished initrd-parse-etc.service. May 17 00:39:36.599934 systemd[1]: Reached target initrd-fs.target. May 17 00:39:36.612636 systemd[1]: Reached target initrd.target. May 17 00:39:36.615129 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:39:36.616419 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:39:36.633263 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:39:36.636118 systemd[1]: Starting initrd-cleanup.service... May 17 00:39:36.653370 systemd[1]: Stopped target nss-lookup.target. May 17 00:39:36.665003 kernel: audit: type=1131 audit(1747442376.658:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.656137 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:39:36.657425 systemd[1]: Stopped target timers.target. May 17 00:39:36.658605 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:39:36.658684 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:39:36.659869 systemd[1]: Stopped target initrd.target. May 17 00:39:36.665752 systemd[1]: Stopped target basic.target. May 17 00:39:36.666898 systemd[1]: Stopped target ignition-complete.target. May 17 00:39:36.668016 systemd[1]: Stopped target ignition-diskful.target. May 17 00:39:36.669115 systemd[1]: Stopped target initrd-root-device.target. May 17 00:39:36.670236 systemd[1]: Stopped target remote-fs.target. May 17 00:39:36.671306 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:39:36.672365 systemd[1]: Stopped target sysinit.target. May 17 00:39:36.682932 kernel: audit: type=1131 audit(1747442376.677:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.673493 systemd[1]: Stopped target local-fs.target. May 17 00:39:36.674557 systemd[1]: Stopped target local-fs-pre.target. May 17 00:39:36.689931 kernel: audit: type=1131 audit(1747442376.683:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.675598 systemd[1]: Stopped target swap.target. May 17 00:39:36.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.676657 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:39:36.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.676740 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:39:36.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.699211 iscsid[1112]: iscsid shutting down. May 17 00:39:36.677946 systemd[1]: Stopped target cryptsetup.target. May 17 00:39:36.683541 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:39:36.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.683631 systemd[1]: Stopped dracut-initqueue.service. May 17 00:39:36.684844 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:39:36.684917 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:39:36.690661 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:39:36.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.690737 systemd[1]: Stopped ignition-files.service. May 17 00:39:36.692939 systemd[1]: Stopping ignition-mount.service... May 17 00:39:36.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.694967 systemd[1]: Stopping iscsid.service... May 17 00:39:36.696932 systemd[1]: Stopping sysroot-boot.service... May 17 00:39:36.722801 ignition[1300]: INFO : Ignition 2.14.0 May 17 00:39:36.722801 ignition[1300]: INFO : Stage: umount May 17 00:39:36.722801 ignition[1300]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:39:36.722801 ignition[1300]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:39:36.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.697940 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:39:36.698057 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:39:36.700404 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:39:36.700464 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:39:36.705447 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:39:36.707631 systemd[1]: Stopped iscsid.service. May 17 00:39:36.711208 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:39:36.711363 systemd[1]: Finished initrd-cleanup.service. May 17 00:39:36.720272 systemd[1]: Stopping iscsiuio.service... May 17 00:39:36.721679 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:39:36.723932 systemd[1]: Stopped iscsiuio.service. May 17 00:39:36.736329 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:39:36.743462 ignition[1300]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:39:36.744566 ignition[1300]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:39:36.748064 ignition[1300]: INFO : PUT result: OK May 17 00:39:36.750988 ignition[1300]: INFO : umount: umount passed May 17 00:39:36.751881 ignition[1300]: INFO : Ignition finished successfully May 17 00:39:36.752688 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:39:36.752827 systemd[1]: Stopped ignition-mount.service. May 17 00:39:36.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.754246 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:39:36.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.754310 systemd[1]: Stopped ignition-disks.service. May 17 00:39:36.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.755293 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:39:36.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.755348 systemd[1]: Stopped ignition-kargs.service. May 17 00:39:36.756377 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:39:36.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.756430 systemd[1]: Stopped ignition-fetch.service. May 17 00:39:36.757598 systemd[1]: Stopped target network.target. May 17 00:39:36.758643 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:39:36.758702 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:39:36.759773 systemd[1]: Stopped target paths.target. May 17 00:39:36.760841 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:39:36.764874 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:39:36.765729 systemd[1]: Stopped target slices.target. May 17 00:39:36.766715 systemd[1]: Stopped target sockets.target. May 17 00:39:36.767781 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:39:36.767846 systemd[1]: Closed iscsid.socket. May 17 00:39:36.768846 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:39:36.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.768893 systemd[1]: Closed iscsiuio.socket. May 17 00:39:36.769976 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:39:36.770037 systemd[1]: Stopped ignition-setup.service. May 17 00:39:36.771242 systemd[1]: Stopping systemd-networkd.service... May 17 00:39:36.772412 systemd[1]: Stopping systemd-resolved.service... May 17 00:39:36.775859 systemd-networkd[1107]: eth0: DHCPv6 lease lost May 17 00:39:36.778123 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:39:36.778250 systemd[1]: Stopped systemd-resolved.service. May 17 00:39:36.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.779907 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:39:36.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.780029 systemd[1]: Stopped systemd-networkd.service. May 17 00:39:36.781153 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:39:36.783000 audit: BPF prog-id=6 op=UNLOAD May 17 00:39:36.783000 audit: BPF prog-id=9 op=UNLOAD May 17 00:39:36.781196 systemd[1]: Closed systemd-networkd.socket. May 17 00:39:36.783087 systemd[1]: Stopping network-cleanup.service... May 17 00:39:36.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.785485 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:39:36.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.785555 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:39:36.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.786645 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:39:36.786700 systemd[1]: Stopped systemd-sysctl.service. May 17 00:39:36.787802 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:39:36.787948 systemd[1]: Stopped systemd-modules-load.service. May 17 00:39:36.793610 systemd[1]: Stopping systemd-udevd.service... May 17 00:39:36.796250 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:39:36.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.799072 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:39:36.799248 systemd[1]: Stopped systemd-udevd.service. May 17 00:39:36.801013 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:39:36.801081 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:39:36.805916 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:39:36.805987 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:39:36.807320 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:39:36.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.807383 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:39:36.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.808512 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:39:36.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.808568 systemd[1]: Stopped dracut-cmdline.service. May 17 00:39:36.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.809753 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:39:36.809826 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:39:36.812029 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:39:36.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.813686 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:39:36.813770 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:39:36.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.814942 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:39:36.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.814996 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:39:36.816897 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:39:36.816956 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:39:36.822385 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:39:36.823020 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:39:36.823115 systemd[1]: Stopped network-cleanup.service. May 17 00:39:36.825151 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:39:36.825239 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:39:36.904689 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:39:36.904857 systemd[1]: Stopped sysroot-boot.service. May 17 00:39:36.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.906361 systemd[1]: Reached target initrd-switch-root.target. May 17 00:39:36.907408 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:39:36.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.907484 systemd[1]: Stopped initrd-setup-root.service. May 17 00:39:36.909796 systemd[1]: Starting initrd-switch-root.service... May 17 00:39:36.922643 systemd[1]: Switching root. May 17 00:39:36.947426 systemd-journald[185]: Journal stopped May 17 00:39:41.988554 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 17 00:39:41.988642 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:39:41.988667 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:39:41.988687 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:39:41.988710 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:39:41.988729 kernel: SELinux: policy capability open_perms=1 May 17 00:39:41.988748 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:39:41.988768 kernel: SELinux: policy capability always_check_network=0 May 17 00:39:41.988787 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:39:41.988837 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:39:41.988856 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:39:41.988885 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:39:41.988907 systemd[1]: Successfully loaded SELinux policy in 70ms. May 17 00:39:41.988946 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.324ms. May 17 00:39:41.988970 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:39:41.988991 systemd[1]: Detected virtualization amazon. May 17 00:39:41.989012 systemd[1]: Detected architecture x86-64. May 17 00:39:41.989032 systemd[1]: Detected first boot. May 17 00:39:41.989053 systemd[1]: Initializing machine ID from VM UUID. May 17 00:39:41.989075 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:39:41.989099 systemd[1]: Populated /etc with preset unit settings. May 17 00:39:41.989120 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:39:41.989146 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:39:41.989174 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:39:41.989195 kernel: kauditd_printk_skb: 49 callbacks suppressed May 17 00:39:41.989214 kernel: audit: type=1334 audit(1747442381.718:88): prog-id=12 op=LOAD May 17 00:39:41.989244 kernel: audit: type=1334 audit(1747442381.718:89): prog-id=3 op=UNLOAD May 17 00:39:41.989268 kernel: audit: type=1334 audit(1747442381.720:90): prog-id=13 op=LOAD May 17 00:39:41.989286 kernel: audit: type=1334 audit(1747442381.721:91): prog-id=14 op=LOAD May 17 00:39:41.989305 kernel: audit: type=1334 audit(1747442381.721:92): prog-id=4 op=UNLOAD May 17 00:39:41.989324 kernel: audit: type=1334 audit(1747442381.721:93): prog-id=5 op=UNLOAD May 17 00:39:41.989343 kernel: audit: type=1334 audit(1747442381.723:94): prog-id=15 op=LOAD May 17 00:39:41.989361 kernel: audit: type=1334 audit(1747442381.723:95): prog-id=12 op=UNLOAD May 17 00:39:41.989380 kernel: audit: type=1334 audit(1747442381.729:96): prog-id=16 op=LOAD May 17 00:39:41.989399 kernel: audit: type=1334 audit(1747442381.730:97): prog-id=17 op=LOAD May 17 00:39:41.989421 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:39:41.989441 systemd[1]: Stopped initrd-switch-root.service. May 17 00:39:41.989463 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:39:41.989483 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:39:41.989502 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:39:41.989521 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:39:41.989539 systemd[1]: Created slice system-getty.slice. May 17 00:39:41.989559 systemd[1]: Created slice system-modprobe.slice. May 17 00:39:41.989577 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:39:41.989596 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:39:41.989615 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:39:41.989632 systemd[1]: Created slice user.slice. May 17 00:39:41.989650 systemd[1]: Started systemd-ask-password-console.path. May 17 00:39:41.989673 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:39:41.989691 systemd[1]: Set up automount boot.automount. May 17 00:39:41.989708 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:39:41.989727 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:39:41.989752 systemd[1]: Stopped target initrd-fs.target. May 17 00:39:41.989770 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:39:41.989787 systemd[1]: Reached target integritysetup.target. May 17 00:39:41.989828 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:39:41.989852 systemd[1]: Reached target remote-fs.target. May 17 00:39:41.989871 systemd[1]: Reached target slices.target. May 17 00:39:41.989889 systemd[1]: Reached target swap.target. May 17 00:39:41.989907 systemd[1]: Reached target torcx.target. May 17 00:39:41.989925 systemd[1]: Reached target veritysetup.target. May 17 00:39:41.989944 systemd[1]: Listening on systemd-coredump.socket. May 17 00:39:41.989962 systemd[1]: Listening on systemd-initctl.socket. May 17 00:39:41.989981 systemd[1]: Listening on systemd-networkd.socket. May 17 00:39:41.990000 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:39:41.990018 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:39:41.990039 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:39:41.990057 systemd[1]: Mounting dev-hugepages.mount... May 17 00:39:41.990075 systemd[1]: Mounting dev-mqueue.mount... May 17 00:39:41.990094 systemd[1]: Mounting media.mount... May 17 00:39:41.990112 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:41.990130 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:39:41.990149 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:39:41.990168 systemd[1]: Mounting tmp.mount... May 17 00:39:41.990186 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:39:41.990206 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:39:41.990225 systemd[1]: Starting kmod-static-nodes.service... May 17 00:39:41.990244 systemd[1]: Starting modprobe@configfs.service... May 17 00:39:41.990263 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:41.990281 systemd[1]: Starting modprobe@drm.service... May 17 00:39:41.990301 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:41.990319 systemd[1]: Starting modprobe@fuse.service... May 17 00:39:41.990338 systemd[1]: Starting modprobe@loop.service... May 17 00:39:41.990357 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:39:41.990379 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:39:41.990396 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:39:41.990415 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:39:41.990433 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:39:41.990451 systemd[1]: Stopped systemd-journald.service. May 17 00:39:41.990469 systemd[1]: Starting systemd-journald.service... May 17 00:39:41.990488 systemd[1]: Starting systemd-modules-load.service... May 17 00:39:41.990505 systemd[1]: Starting systemd-network-generator.service... May 17 00:39:41.990524 systemd[1]: Starting systemd-remount-fs.service... May 17 00:39:41.990546 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:39:41.990564 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:39:41.990582 systemd[1]: Stopped verity-setup.service. May 17 00:39:41.990600 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:41.990618 systemd[1]: Mounted dev-hugepages.mount. May 17 00:39:41.990633 systemd[1]: Mounted dev-mqueue.mount. May 17 00:39:41.992840 kernel: loop: module loaded May 17 00:39:41.992882 systemd[1]: Mounted media.mount. May 17 00:39:41.992905 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:39:41.992927 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:39:41.992946 systemd[1]: Mounted tmp.mount. May 17 00:39:41.992965 kernel: fuse: init (API version 7.34) May 17 00:39:41.992982 systemd[1]: Finished kmod-static-nodes.service. May 17 00:39:41.993001 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:39:41.993019 systemd[1]: Finished modprobe@configfs.service. May 17 00:39:41.993038 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:41.993059 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:41.993077 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:39:41.993096 systemd[1]: Finished modprobe@drm.service. May 17 00:39:41.993114 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:41.993132 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:41.993156 systemd-journald[1407]: Journal started May 17 00:39:41.993289 systemd-journald[1407]: Runtime Journal (/run/log/journal/ec242a8e698d009c8061a9ec904a1d51) is 4.8M, max 38.3M, 33.5M free. May 17 00:39:37.557000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:39:37.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:39:37.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:39:37.710000 audit: BPF prog-id=10 op=LOAD May 17 00:39:37.710000 audit: BPF prog-id=10 op=UNLOAD May 17 00:39:37.710000 audit: BPF prog-id=11 op=LOAD May 17 00:39:37.710000 audit: BPF prog-id=11 op=UNLOAD May 17 00:39:37.945000 audit[1333]: AVC avc: denied { associate } for pid=1333 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:39:37.945000 audit[1333]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1316 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:37.945000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:39:37.949000 audit[1333]: AVC avc: denied { associate } for pid=1333 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:39:37.949000 audit[1333]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1316 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:37.949000 audit: CWD cwd="/" May 17 00:39:37.949000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:37.949000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:37.949000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:39:41.718000 audit: BPF prog-id=12 op=LOAD May 17 00:39:41.718000 audit: BPF prog-id=3 op=UNLOAD May 17 00:39:41.720000 audit: BPF prog-id=13 op=LOAD May 17 00:39:41.721000 audit: BPF prog-id=14 op=LOAD May 17 00:39:41.721000 audit: BPF prog-id=4 op=UNLOAD May 17 00:39:41.721000 audit: BPF prog-id=5 op=UNLOAD May 17 00:39:41.723000 audit: BPF prog-id=15 op=LOAD May 17 00:39:41.723000 audit: BPF prog-id=12 op=UNLOAD May 17 00:39:41.729000 audit: BPF prog-id=16 op=LOAD May 17 00:39:41.730000 audit: BPF prog-id=17 op=LOAD May 17 00:39:41.730000 audit: BPF prog-id=13 op=UNLOAD May 17 00:39:41.730000 audit: BPF prog-id=14 op=UNLOAD May 17 00:39:41.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.739000 audit: BPF prog-id=15 op=UNLOAD May 17 00:39:41.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.884000 audit: BPF prog-id=18 op=LOAD May 17 00:39:41.884000 audit: BPF prog-id=19 op=LOAD May 17 00:39:41.884000 audit: BPF prog-id=20 op=LOAD May 17 00:39:41.885000 audit: BPF prog-id=16 op=UNLOAD May 17 00:39:41.885000 audit: BPF prog-id=17 op=UNLOAD May 17 00:39:41.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.998921 systemd[1]: Started systemd-journald.service. May 17 00:39:41.985000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:39:41.985000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc6c5f0d90 a2=4000 a3=7ffc6c5f0e2c items=0 ppid=1 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.985000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:39:41.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.932769 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:39:41.717889 systemd[1]: Queued start job for default target multi-user.target. May 17 00:39:37.933921 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:39:41.717902 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 17 00:39:41.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.933952 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:39:41.732393 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:39:37.933997 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:39:37.934013 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:39:42.000252 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:39:37.934059 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:39:42.000446 systemd[1]: Finished modprobe@fuse.service. May 17 00:39:37.934079 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:39:37.934341 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:39:37.934403 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:39:37.934427 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:39:37.936115 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:39:37.936260 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:39:37.936289 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:39:37.936314 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:39:37.936343 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:39:37.936365 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:39:42.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.197076 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.197366 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.197474 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.197660 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:39:41.197710 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:39:41.197768 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2025-05-17T00:39:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:39:42.004891 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:42.005086 systemd[1]: Finished modprobe@loop.service. May 17 00:39:42.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.006610 systemd[1]: Finished systemd-modules-load.service. May 17 00:39:42.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.007779 systemd[1]: Finished systemd-network-generator.service. May 17 00:39:42.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.009010 systemd[1]: Finished systemd-remount-fs.service. May 17 00:39:42.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.010678 systemd[1]: Reached target network-pre.target. May 17 00:39:42.014169 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:39:42.018044 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:39:42.022828 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:39:42.025407 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:39:42.030034 systemd[1]: Starting systemd-journal-flush.service... May 17 00:39:42.030905 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:42.032318 systemd[1]: Starting systemd-random-seed.service... May 17 00:39:42.033183 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:42.034655 systemd[1]: Starting systemd-sysctl.service... May 17 00:39:42.040929 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:39:42.041868 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:39:42.056671 systemd-journald[1407]: Time spent on flushing to /var/log/journal/ec242a8e698d009c8061a9ec904a1d51 is 63.345ms for 1222 entries. May 17 00:39:42.056671 systemd-journald[1407]: System Journal (/var/log/journal/ec242a8e698d009c8061a9ec904a1d51) is 8.0M, max 195.6M, 187.6M free. May 17 00:39:42.135100 systemd-journald[1407]: Received client request to flush runtime journal. May 17 00:39:42.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.061435 systemd[1]: Finished systemd-random-seed.service. May 17 00:39:42.062354 systemd[1]: Reached target first-boot-complete.target. May 17 00:39:42.137063 udevadm[1450]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:39:42.079261 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:39:42.081717 systemd[1]: Starting systemd-sysusers.service... May 17 00:39:42.087785 systemd[1]: Finished systemd-sysctl.service. May 17 00:39:42.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.103420 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:39:42.105838 systemd[1]: Starting systemd-udev-settle.service... May 17 00:39:42.136615 systemd[1]: Finished systemd-journal-flush.service. May 17 00:39:42.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.194683 systemd[1]: Finished systemd-sysusers.service. May 17 00:39:42.197104 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:39:42.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.296236 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:39:42.712692 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:39:42.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.713000 audit: BPF prog-id=21 op=LOAD May 17 00:39:42.713000 audit: BPF prog-id=22 op=LOAD May 17 00:39:42.713000 audit: BPF prog-id=7 op=UNLOAD May 17 00:39:42.713000 audit: BPF prog-id=8 op=UNLOAD May 17 00:39:42.714699 systemd[1]: Starting systemd-udevd.service... May 17 00:39:42.733154 systemd-udevd[1454]: Using default interface naming scheme 'v252'. May 17 00:39:42.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.791000 audit: BPF prog-id=23 op=LOAD May 17 00:39:42.790637 systemd[1]: Started systemd-udevd.service. May 17 00:39:42.792798 systemd[1]: Starting systemd-networkd.service... May 17 00:39:42.817182 systemd[1]: Starting systemd-userdbd.service... May 17 00:39:42.815000 audit: BPF prog-id=24 op=LOAD May 17 00:39:42.815000 audit: BPF prog-id=25 op=LOAD May 17 00:39:42.815000 audit: BPF prog-id=26 op=LOAD May 17 00:39:42.832197 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:39:42.849610 (udev-worker)[1461]: Network interface NamePolicy= disabled on kernel command line. May 17 00:39:42.857429 systemd[1]: Started systemd-userdbd.service. May 17 00:39:42.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.894000 audit[1469]: AVC avc: denied { confidentiality } for pid=1469 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:39:42.894000 audit[1469]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f7864d6230 a1=338ac a2=7fb853627bc5 a3=5 items=110 ppid=1454 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:42.894000 audit: CWD cwd="/" May 17 00:39:42.894000 audit: PATH item=0 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=1 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=2 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=3 name=(null) inode=14279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=4 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=5 name=(null) inode=14280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=6 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=7 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=8 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=9 name=(null) inode=14282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=10 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=11 name=(null) inode=14283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=12 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=13 name=(null) inode=14284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=14 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=15 name=(null) inode=14285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=16 name=(null) inode=14281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=17 name=(null) inode=14286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=18 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=19 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=20 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=21 name=(null) inode=14288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=22 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=23 name=(null) inode=14289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=24 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=25 name=(null) inode=14290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=26 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=27 name=(null) inode=14291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=28 name=(null) inode=14287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=29 name=(null) inode=14292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=30 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=31 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=32 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=33 name=(null) inode=14294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=34 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=35 name=(null) inode=14295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=36 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=37 name=(null) inode=14296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=38 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=39 name=(null) inode=14297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=40 name=(null) inode=14293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=41 name=(null) inode=14298 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=42 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=43 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=44 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=45 name=(null) inode=14300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=46 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=47 name=(null) inode=14301 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=48 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=49 name=(null) inode=14302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=50 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=51 name=(null) inode=14303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=52 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=53 name=(null) inode=14304 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=54 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=55 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=56 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=57 name=(null) inode=14306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=58 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=59 name=(null) inode=14307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=60 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=61 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=62 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=63 name=(null) inode=14309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=64 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=65 name=(null) inode=14310 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=66 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=67 name=(null) inode=14311 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=68 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=69 name=(null) inode=14312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=70 name=(null) inode=14308 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=71 name=(null) inode=14313 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=72 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=73 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=74 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=75 name=(null) inode=14315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=76 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=77 name=(null) inode=14316 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=78 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=79 name=(null) inode=14317 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=80 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=81 name=(null) inode=14318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=82 name=(null) inode=14314 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=83 name=(null) inode=14319 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=84 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=85 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=86 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=87 name=(null) inode=14321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=88 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=89 name=(null) inode=14322 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=90 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=91 name=(null) inode=14323 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=92 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=93 name=(null) inode=14324 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=94 name=(null) inode=14320 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=95 name=(null) inode=14325 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=96 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=97 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=98 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=99 name=(null) inode=14327 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=100 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=101 name=(null) inode=14328 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=102 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=103 name=(null) inode=14329 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=104 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=105 name=(null) inode=14330 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=106 name=(null) inode=14326 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=107 name=(null) inode=14331 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PATH item=109 name=(null) inode=14332 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:39:42.894000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:39:42.910835 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:39:42.918859 kernel: ACPI: button: Power Button [PWRF] May 17 00:39:42.931833 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:39:42.957848 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:39:42.969839 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:39:42.983086 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:39:42.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.974310 systemd-networkd[1462]: lo: Link UP May 17 00:39:42.974317 systemd-networkd[1462]: lo: Gained carrier May 17 00:39:42.975261 systemd-networkd[1462]: Enumeration completed May 17 00:39:42.975459 systemd[1]: Started systemd-networkd.service. May 17 00:39:42.978053 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:39:42.984248 systemd-networkd[1462]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:39:42.988829 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:39:42.989027 systemd-networkd[1462]: eth0: Link UP May 17 00:39:42.989323 systemd-networkd[1462]: eth0: Gained carrier May 17 00:39:42.998022 systemd-networkd[1462]: eth0: DHCPv4 address 172.31.25.158/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:39:42.999357 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:39:43.123640 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:39:43.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.126252 systemd[1]: Finished systemd-udev-settle.service. May 17 00:39:43.128014 systemd[1]: Starting lvm2-activation-early.service... May 17 00:39:43.197675 lvm[1569]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:39:43.225158 systemd[1]: Finished lvm2-activation-early.service. May 17 00:39:43.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.226015 systemd[1]: Reached target cryptsetup.target. May 17 00:39:43.227776 systemd[1]: Starting lvm2-activation.service... May 17 00:39:43.233026 lvm[1570]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:39:43.258570 systemd[1]: Finished lvm2-activation.service. May 17 00:39:43.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.259225 systemd[1]: Reached target local-fs-pre.target. May 17 00:39:43.259704 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:39:43.259734 systemd[1]: Reached target local-fs.target. May 17 00:39:43.260177 systemd[1]: Reached target machines.target. May 17 00:39:43.261835 systemd[1]: Starting ldconfig.service... May 17 00:39:43.263191 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:43.263260 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:43.264330 systemd[1]: Starting systemd-boot-update.service... May 17 00:39:43.265863 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:39:43.268393 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:39:43.270009 systemd[1]: Starting systemd-sysext.service... May 17 00:39:43.283110 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1572 (bootctl) May 17 00:39:43.284525 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:39:43.287151 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:39:43.294703 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:39:43.294948 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:39:43.310841 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:39:43.313775 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:39:43.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.461321 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:39:43.463679 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:39:43.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.462106 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:39:43.467752 systemd-fsck[1583]: fsck.fat 4.2 (2021-01-31) May 17 00:39:43.467752 systemd-fsck[1583]: /dev/nvme0n1p1: 790 files, 120726/258078 clusters May 17 00:39:43.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.468681 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:39:43.471549 systemd[1]: Mounting boot.mount... May 17 00:39:43.483826 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:39:43.495879 systemd[1]: Mounted boot.mount. May 17 00:39:43.512337 (sd-sysext)[1587]: Using extensions 'kubernetes'. May 17 00:39:43.514214 (sd-sysext)[1587]: Merged extensions into '/usr'. May 17 00:39:43.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.522638 systemd[1]: Finished systemd-boot-update.service. May 17 00:39:43.540361 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:43.542591 systemd[1]: Mounting usr-share-oem.mount... May 17 00:39:43.543852 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:39:43.545934 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:43.549091 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:43.553707 systemd[1]: Starting modprobe@loop.service... May 17 00:39:43.554589 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:43.554780 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:43.554981 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:43.559063 systemd[1]: Mounted usr-share-oem.mount. May 17 00:39:43.560164 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:43.560336 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:43.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.561368 systemd[1]: Finished systemd-sysext.service. May 17 00:39:43.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.562175 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:43.562323 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:43.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.563079 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:43.563221 systemd[1]: Finished modprobe@loop.service. May 17 00:39:43.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.566292 systemd[1]: Starting ensure-sysext.service... May 17 00:39:43.567046 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:43.567141 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:43.568658 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:39:43.576883 systemd[1]: Reloading. May 17 00:39:43.613985 systemd-tmpfiles[1605]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:39:43.618148 systemd-tmpfiles[1605]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:39:43.628323 systemd-tmpfiles[1605]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:39:43.660609 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2025-05-17T00:39:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:39:43.660647 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2025-05-17T00:39:43Z" level=info msg="torcx already run" May 17 00:39:43.810778 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:39:43.810798 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:39:43.851838 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:39:43.932000 audit: BPF prog-id=27 op=LOAD May 17 00:39:43.932000 audit: BPF prog-id=23 op=UNLOAD May 17 00:39:43.934000 audit: BPF prog-id=28 op=LOAD May 17 00:39:43.934000 audit: BPF prog-id=24 op=UNLOAD May 17 00:39:43.934000 audit: BPF prog-id=29 op=LOAD May 17 00:39:43.934000 audit: BPF prog-id=30 op=LOAD May 17 00:39:43.934000 audit: BPF prog-id=25 op=UNLOAD May 17 00:39:43.934000 audit: BPF prog-id=26 op=UNLOAD May 17 00:39:43.937000 audit: BPF prog-id=31 op=LOAD May 17 00:39:43.937000 audit: BPF prog-id=32 op=LOAD May 17 00:39:43.937000 audit: BPF prog-id=21 op=UNLOAD May 17 00:39:43.937000 audit: BPF prog-id=22 op=UNLOAD May 17 00:39:43.937000 audit: BPF prog-id=33 op=LOAD May 17 00:39:43.937000 audit: BPF prog-id=18 op=UNLOAD May 17 00:39:43.938000 audit: BPF prog-id=34 op=LOAD May 17 00:39:43.938000 audit: BPF prog-id=35 op=LOAD May 17 00:39:43.938000 audit: BPF prog-id=19 op=UNLOAD May 17 00:39:43.938000 audit: BPF prog-id=20 op=UNLOAD May 17 00:39:43.942872 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:39:43.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.949418 systemd[1]: Starting audit-rules.service... May 17 00:39:43.952911 systemd[1]: Starting clean-ca-certificates.service... May 17 00:39:43.955888 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:39:43.959000 audit: BPF prog-id=36 op=LOAD May 17 00:39:43.962000 audit: BPF prog-id=37 op=LOAD May 17 00:39:43.961516 systemd[1]: Starting systemd-resolved.service... May 17 00:39:43.964556 systemd[1]: Starting systemd-timesyncd.service... May 17 00:39:43.967010 systemd[1]: Starting systemd-update-utmp.service... May 17 00:39:43.981600 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:39:43.983526 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:43.986598 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:43.986000 audit[1687]: SYSTEM_BOOT pid=1687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:39:43.990197 systemd[1]: Starting modprobe@loop.service... May 17 00:39:43.990952 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:43.991144 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:43.992474 systemd[1]: Finished clean-ca-certificates.service. May 17 00:39:43.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.995908 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:43.996078 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:43.997473 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:43.997643 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:43.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:43.999645 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:43.999821 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.005783 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.006074 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.006265 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:39:44.012136 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:39:44.014212 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:44.017878 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:44.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.021514 systemd[1]: Starting modprobe@loop.service... May 17 00:39:44.022235 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:44.022429 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:44.022620 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:39:44.023995 systemd[1]: Finished systemd-update-utmp.service. May 17 00:39:44.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.034152 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:44.034329 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:44.035662 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:44.035846 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:44.038099 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.038839 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:44.038975 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.039594 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.045241 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:39:44.048763 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:39:44.052228 systemd[1]: Starting modprobe@drm.service... May 17 00:39:44.056473 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:39:44.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.060422 systemd[1]: Starting modprobe@loop.service... May 17 00:39:44.061171 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:39:44.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.061439 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:44.061672 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:39:44.065094 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:39:44.065298 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:39:44.066255 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:39:44.070276 systemd[1]: Finished ensure-sysext.service. May 17 00:39:44.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.082074 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:39:44.082239 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:39:44.083204 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:39:44.083373 systemd[1]: Finished modprobe@loop.service. May 17 00:39:44.084033 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:39:44.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.094109 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:39:44.094289 systemd[1]: Finished modprobe@drm.service. May 17 00:39:44.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.100762 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:39:44.146046 systemd-resolved[1685]: Positive Trust Anchors: May 17 00:39:44.146069 systemd-resolved[1685]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:39:44.146111 systemd-resolved[1685]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:39:44.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.149719 systemd[1]: Started systemd-timesyncd.service. May 17 00:39:44.150383 systemd[1]: Reached target time-set.target. May 17 00:39:44.156000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:39:44.157935 augenrules[1711]: No rules May 17 00:39:44.156000 audit[1711]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe66636960 a2=420 a3=0 items=0 ppid=1681 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:44.156000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:39:44.158990 systemd[1]: Finished audit-rules.service. May 17 00:39:44.193086 systemd-resolved[1685]: Defaulting to hostname 'linux'. May 17 00:39:44.195337 systemd[1]: Started systemd-resolved.service. May 17 00:39:44.195776 systemd[1]: Reached target network.target. May 17 00:39:44.196114 systemd[1]: Reached target nss-lookup.target. May 17 00:39:44.977163 systemd-timesyncd[1686]: Contacted time server 23.186.168.127:123 (0.flatcar.pool.ntp.org). May 17 00:39:44.977172 systemd-resolved[1685]: Clock change detected. Flushing caches. May 17 00:39:44.977298 systemd-timesyncd[1686]: Initial clock synchronization to Sat 2025-05-17 00:39:44.976937 UTC. May 17 00:39:45.012752 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:45.012783 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:39:45.281782 ldconfig[1571]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:39:45.287851 systemd[1]: Finished ldconfig.service. May 17 00:39:45.289599 systemd[1]: Starting systemd-update-done.service... May 17 00:39:45.297930 systemd[1]: Finished systemd-update-done.service. May 17 00:39:45.298451 systemd[1]: Reached target sysinit.target. May 17 00:39:45.298926 systemd[1]: Started motdgen.path. May 17 00:39:45.299294 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:39:45.299760 systemd[1]: Started logrotate.timer. May 17 00:39:45.300185 systemd[1]: Started mdadm.timer. May 17 00:39:45.300513 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:39:45.300833 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:39:45.300864 systemd[1]: Reached target paths.target. May 17 00:39:45.301171 systemd[1]: Reached target timers.target. May 17 00:39:45.302043 systemd[1]: Listening on dbus.socket. May 17 00:39:45.303680 systemd[1]: Starting docker.socket... May 17 00:39:45.307520 systemd[1]: Listening on sshd.socket. May 17 00:39:45.308023 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:45.308545 systemd[1]: Listening on docker.socket. May 17 00:39:45.308943 systemd[1]: Reached target sockets.target. May 17 00:39:45.309329 systemd[1]: Reached target basic.target. May 17 00:39:45.309676 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:39:45.309710 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:39:45.310811 systemd[1]: Starting containerd.service... May 17 00:39:45.312219 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:39:45.314178 systemd[1]: Starting dbus.service... May 17 00:39:45.316557 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:39:45.319891 systemd[1]: Starting extend-filesystems.service... May 17 00:39:45.324641 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:39:45.326324 systemd[1]: Starting motdgen.service... May 17 00:39:45.331246 systemd[1]: Starting prepare-helm.service... May 17 00:39:45.334186 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:39:45.337532 systemd[1]: Starting sshd-keygen.service... May 17 00:39:45.344467 systemd[1]: Starting systemd-logind.service... May 17 00:39:45.345267 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:45.345373 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:39:45.346031 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:39:45.349200 jq[1723]: false May 17 00:39:45.350345 systemd[1]: Starting update-engine.service... May 17 00:39:45.353280 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:39:45.356476 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:39:45.357189 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:39:45.381945 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:39:45.382206 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:39:45.388726 jq[1734]: true May 17 00:39:45.397753 extend-filesystems[1724]: Found loop1 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p1 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p2 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p3 May 17 00:39:45.398736 extend-filesystems[1724]: Found usr May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p4 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p6 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p7 May 17 00:39:45.398736 extend-filesystems[1724]: Found nvme0n1p9 May 17 00:39:45.398736 extend-filesystems[1724]: Checking size of /dev/nvme0n1p9 May 17 00:39:45.439584 jq[1748]: true May 17 00:39:45.435864 systemd[1]: Started dbus.service. May 17 00:39:45.441379 tar[1736]: linux-amd64/LICENSE May 17 00:39:45.441379 tar[1736]: linux-amd64/helm May 17 00:39:45.435636 dbus-daemon[1722]: [system] SELinux support is enabled May 17 00:39:45.439515 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:39:45.439549 systemd[1]: Reached target system-config.target. May 17 00:39:45.440146 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:39:45.440172 systemd[1]: Reached target user-config.target. May 17 00:39:45.460283 extend-filesystems[1724]: Resized partition /dev/nvme0n1p9 May 17 00:39:45.461077 dbus-daemon[1722]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1462 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:39:45.463779 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:39:45.464367 dbus-daemon[1722]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:39:45.463999 systemd[1]: Finished motdgen.service. May 17 00:39:45.469773 systemd[1]: Starting systemd-hostnamed.service... May 17 00:39:45.485102 extend-filesystems[1765]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:39:45.495150 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 17 00:39:45.541257 systemd-networkd[1462]: eth0: Gained IPv6LL May 17 00:39:45.545270 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:39:45.546057 systemd[1]: Reached target network-online.target. May 17 00:39:45.550761 systemd[1]: Started amazon-ssm-agent.service. May 17 00:39:45.554195 systemd[1]: Starting kubelet.service... May 17 00:39:45.558567 systemd[1]: Started nvidia.service. May 17 00:39:45.636349 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 17 00:39:45.669216 bash[1782]: Updated "/home/core/.ssh/authorized_keys" May 17 00:39:45.671782 extend-filesystems[1765]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 17 00:39:45.671782 extend-filesystems[1765]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:39:45.671782 extend-filesystems[1765]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 17 00:39:45.670376 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:39:45.677264 extend-filesystems[1724]: Resized filesystem in /dev/nvme0n1p9 May 17 00:39:45.673473 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:39:45.673682 systemd[1]: Finished extend-filesystems.service. May 17 00:39:45.714736 update_engine[1732]: I0517 00:39:45.714143 1732 main.cc:92] Flatcar Update Engine starting May 17 00:39:45.721083 systemd[1]: Started update-engine.service. May 17 00:39:45.725378 update_engine[1732]: I0517 00:39:45.721158 1732 update_check_scheduler.cc:74] Next update check in 6m1s May 17 00:39:45.724187 systemd[1]: Started locksmithd.service. May 17 00:39:45.727434 env[1739]: time="2025-05-17T00:39:45.727369046Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:39:45.817406 systemd-logind[1731]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:39:45.817441 systemd-logind[1731]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:39:45.817465 systemd-logind[1731]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:39:45.824614 systemd-logind[1731]: New seat seat0. May 17 00:39:45.827106 amazon-ssm-agent[1784]: 2025/05/17 00:39:45 Failed to load instance info from vault. RegistrationKey does not exist. May 17 00:39:45.830238 systemd[1]: Started systemd-logind.service. May 17 00:39:45.833083 amazon-ssm-agent[1784]: Initializing new seelog logger May 17 00:39:45.833575 amazon-ssm-agent[1784]: New Seelog Logger Creation Complete May 17 00:39:45.833575 amazon-ssm-agent[1784]: 2025/05/17 00:39:45 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:39:45.833575 amazon-ssm-agent[1784]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:39:45.833727 amazon-ssm-agent[1784]: 2025/05/17 00:39:45 processing appconfig overrides May 17 00:39:45.950153 dbus-daemon[1722]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:39:45.950348 systemd[1]: Started systemd-hostnamed.service. May 17 00:39:45.952578 dbus-daemon[1722]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1769 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:39:45.953685 env[1739]: time="2025-05-17T00:39:45.953611527Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:39:45.956619 systemd[1]: Starting polkit.service... May 17 00:39:45.959015 env[1739]: time="2025-05-17T00:39:45.958980355Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:45.961027 env[1739]: time="2025-05-17T00:39:45.960987837Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:39:45.964227 env[1739]: time="2025-05-17T00:39:45.964181588Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:45.968044 env[1739]: time="2025-05-17T00:39:45.967993491Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:39:45.968918 env[1739]: time="2025-05-17T00:39:45.968879168Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:39:45.969090 env[1739]: time="2025-05-17T00:39:45.969069334Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:39:45.969225 env[1739]: time="2025-05-17T00:39:45.969206984Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:39:45.969570 env[1739]: time="2025-05-17T00:39:45.969547229Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:45.978330 env[1739]: time="2025-05-17T00:39:45.978277819Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:45.978850 env[1739]: time="2025-05-17T00:39:45.978805123Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:39:45.983982 polkitd[1834]: Started polkitd version 121 May 17 00:39:45.984421 env[1739]: time="2025-05-17T00:39:45.984379218Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:39:45.984657 env[1739]: time="2025-05-17T00:39:45.984635057Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:39:45.984964 env[1739]: time="2025-05-17T00:39:45.984943635Z" level=info msg="metadata content store policy set" policy=shared May 17 00:39:45.992106 env[1739]: time="2025-05-17T00:39:45.992063988Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:39:45.992294 env[1739]: time="2025-05-17T00:39:45.992275593Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:39:45.992389 env[1739]: time="2025-05-17T00:39:45.992373251Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:39:45.992507 env[1739]: time="2025-05-17T00:39:45.992490245Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:39:45.992661 env[1739]: time="2025-05-17T00:39:45.992643438Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:39:45.992748 env[1739]: time="2025-05-17T00:39:45.992732962Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:39:45.992823 env[1739]: time="2025-05-17T00:39:45.992809053Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:39:45.992897 env[1739]: time="2025-05-17T00:39:45.992883591Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:39:45.992978 env[1739]: time="2025-05-17T00:39:45.992964272Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:39:45.993052 env[1739]: time="2025-05-17T00:39:45.993037992Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:39:45.993146 env[1739]: time="2025-05-17T00:39:45.993110710Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:39:45.993225 env[1739]: time="2025-05-17T00:39:45.993211155Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:39:45.993430 env[1739]: time="2025-05-17T00:39:45.993412842Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:39:45.993607 env[1739]: time="2025-05-17T00:39:45.993589015Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:39:45.994151 env[1739]: time="2025-05-17T00:39:45.994109739Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:39:45.999181 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:39:46.005567 env[1739]: time="2025-05-17T00:39:46.005516995Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:39:46.016246 env[1739]: time="2025-05-17T00:39:46.016203214Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:39:46.016507 env[1739]: time="2025-05-17T00:39:46.016483963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:39:46.016631 env[1739]: time="2025-05-17T00:39:46.016611585Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:39:46.016722 env[1739]: time="2025-05-17T00:39:46.016706057Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:39:46.016810 env[1739]: time="2025-05-17T00:39:46.016795035Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:39:46.016895 env[1739]: time="2025-05-17T00:39:46.016878351Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:39:46.016977 env[1739]: time="2025-05-17T00:39:46.016961962Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:39:46.017059 env[1739]: time="2025-05-17T00:39:46.017043928Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:39:46.017157 env[1739]: time="2025-05-17T00:39:46.017140361Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:39:46.017273 env[1739]: time="2025-05-17T00:39:46.017256522Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:39:46.017418 polkitd[1834]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:39:46.017498 polkitd[1834]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:39:46.017795 env[1739]: time="2025-05-17T00:39:46.017762607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:39:46.021867 polkitd[1834]: Finished loading, compiling and executing 2 rules May 17 00:39:46.022088 env[1739]: time="2025-05-17T00:39:46.022049405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:39:46.022228 env[1739]: time="2025-05-17T00:39:46.022200718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:39:46.022315 env[1739]: time="2025-05-17T00:39:46.022298144Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:39:46.024221 env[1739]: time="2025-05-17T00:39:46.024174676Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:39:46.024557 env[1739]: time="2025-05-17T00:39:46.024535264Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:39:46.024673 env[1739]: time="2025-05-17T00:39:46.024654394Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:39:46.024787 env[1739]: time="2025-05-17T00:39:46.024769854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:39:46.025281 env[1739]: time="2025-05-17T00:39:46.025202298Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:39:46.027209 dbus-daemon[1722]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:39:46.027414 systemd[1]: Started polkit.service. May 17 00:39:46.027650 polkitd[1834]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:39:46.030992 env[1739]: time="2025-05-17T00:39:46.030957459Z" level=info msg="Connect containerd service" May 17 00:39:46.031377 env[1739]: time="2025-05-17T00:39:46.031351165Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:39:46.032701 env[1739]: time="2025-05-17T00:39:46.032670666Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:39:46.037146 env[1739]: time="2025-05-17T00:39:46.037084715Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:39:46.040941 env[1739]: time="2025-05-17T00:39:46.040909085Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:39:46.041198 env[1739]: time="2025-05-17T00:39:46.041178953Z" level=info msg="containerd successfully booted in 0.314843s" May 17 00:39:46.041267 systemd[1]: Started containerd.service. May 17 00:39:46.065737 env[1739]: time="2025-05-17T00:39:46.065668686Z" level=info msg="Start subscribing containerd event" May 17 00:39:46.065940 env[1739]: time="2025-05-17T00:39:46.065917945Z" level=info msg="Start recovering state" May 17 00:39:46.066227 env[1739]: time="2025-05-17T00:39:46.066209897Z" level=info msg="Start event monitor" May 17 00:39:46.067201 env[1739]: time="2025-05-17T00:39:46.067169834Z" level=info msg="Start snapshots syncer" May 17 00:39:46.070365 env[1739]: time="2025-05-17T00:39:46.070281235Z" level=info msg="Start cni network conf syncer for default" May 17 00:39:46.070512 env[1739]: time="2025-05-17T00:39:46.070485111Z" level=info msg="Start streaming server" May 17 00:39:46.075302 systemd-hostnamed[1769]: Hostname set to (transient) May 17 00:39:46.075431 systemd-resolved[1685]: System hostname changed to 'ip-172-31-25-158'. May 17 00:39:46.299536 coreos-metadata[1721]: May 17 00:39:46.299 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:39:46.314360 coreos-metadata[1721]: May 17 00:39:46.314 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 17 00:39:46.315588 coreos-metadata[1721]: May 17 00:39:46.315 INFO Fetch successful May 17 00:39:46.316201 coreos-metadata[1721]: May 17 00:39:46.315 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 17 00:39:46.316340 coreos-metadata[1721]: May 17 00:39:46.316 INFO Fetch successful May 17 00:39:46.339132 unknown[1721]: wrote ssh authorized keys file for user: core May 17 00:39:46.357439 update-ssh-keys[1897]: Updated "/home/core/.ssh/authorized_keys" May 17 00:39:46.358144 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:39:46.502549 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Create new startup processor May 17 00:39:46.506889 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [LongRunningPluginsManager] registered plugins: {} May 17 00:39:46.507059 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing bookkeeping folders May 17 00:39:46.507160 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO removing the completed state files May 17 00:39:46.507242 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing bookkeeping folders for long running plugins May 17 00:39:46.507302 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 17 00:39:46.507357 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing healthcheck folders for long running plugins May 17 00:39:46.507411 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing locations for inventory plugin May 17 00:39:46.507472 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing default location for custom inventory May 17 00:39:46.507523 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing default location for file inventory May 17 00:39:46.507579 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Initializing default location for role inventory May 17 00:39:46.507635 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Init the cloudwatchlogs publisher May 17 00:39:46.507695 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:refreshAssociation May 17 00:39:46.507754 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:downloadContent May 17 00:39:46.507814 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:runDocument May 17 00:39:46.507909 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:updateSsmAgent May 17 00:39:46.507972 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:runDockerAction May 17 00:39:46.508030 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:configureDocker May 17 00:39:46.508088 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:configurePackage May 17 00:39:46.508169 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:softwareInventory May 17 00:39:46.508230 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform independent plugin aws:runPowerShellScript May 17 00:39:46.508295 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Successfully loaded platform dependent plugin aws:runShellScript May 17 00:39:46.508356 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 17 00:39:46.510182 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO OS: linux, Arch: amd64 May 17 00:39:46.511668 amazon-ssm-agent[1784]: datastore file /var/lib/amazon/ssm/i-01bf0261d8b86f3fe/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 17 00:39:46.602853 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] Starting session document processing engine... May 17 00:39:46.697490 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] [EngineProcessor] Starting May 17 00:39:46.791771 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 17 00:39:46.850065 tar[1736]: linux-amd64/README.md May 17 00:39:46.857336 systemd[1]: Finished prepare-helm.service. May 17 00:39:46.886661 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-01bf0261d8b86f3fe, requestId: f2b29a80-6429-463f-a52d-e886402f72b1 May 17 00:39:46.981426 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] Starting document processing engine... May 17 00:39:47.077062 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 17 00:39:47.100406 locksmithd[1799]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:39:47.171838 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 17 00:39:47.266671 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] Starting message polling May 17 00:39:47.362165 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] Starting send replies to MDS May 17 00:39:47.420929 sshd_keygen[1750]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:39:47.448788 systemd[1]: Finished sshd-keygen.service. May 17 00:39:47.451443 systemd[1]: Starting issuegen.service... May 17 00:39:47.457865 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:39:47.458078 systemd[1]: Finished issuegen.service. May 17 00:39:47.460420 systemd[1]: Starting systemd-user-sessions.service... May 17 00:39:47.462172 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [instanceID=i-01bf0261d8b86f3fe] Starting association polling May 17 00:39:47.469192 systemd[1]: Finished systemd-user-sessions.service. May 17 00:39:47.471657 systemd[1]: Started getty@tty1.service. May 17 00:39:47.474301 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:39:47.475823 systemd[1]: Reached target getty.target. May 17 00:39:47.557463 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 17 00:39:47.653521 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [Association] Launching response handler May 17 00:39:47.749844 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 17 00:39:47.846245 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 17 00:39:47.942886 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 17 00:39:48.039776 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] listening reply. May 17 00:39:48.136808 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:39:48.234066 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [OfflineService] Starting document processing engine... May 17 00:39:48.244785 systemd[1]: Started kubelet.service. May 17 00:39:48.246307 systemd[1]: Reached target multi-user.target. May 17 00:39:48.249229 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:39:48.258704 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:39:48.258922 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:39:48.259665 systemd[1]: Startup finished in 605ms (kernel) + 6.708s (initrd) + 10.065s (userspace) = 17.379s. May 17 00:39:48.331585 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [OfflineService] [EngineProcessor] Starting May 17 00:39:48.429200 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [OfflineService] [EngineProcessor] Initial processing May 17 00:39:48.527064 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [OfflineService] Starting message polling May 17 00:39:48.625225 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [OfflineService] Starting send replies to MDS May 17 00:39:48.723520 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [LongRunningPluginsManager] starting long running plugin manager May 17 00:39:48.821862 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 17 00:39:48.920562 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 17 00:39:49.019331 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [StartupProcessor] Executing startup processor tasks May 17 00:39:49.118425 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 17 00:39:49.217635 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 17 00:39:49.317529 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 17 00:39:49.346028 kubelet[1932]: E0517 00:39:49.345974 1932 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:39:49.347570 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:39:49.347704 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:39:49.347933 systemd[1]: kubelet.service: Consumed 1.163s CPU time. May 17 00:39:49.417171 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-01bf0261d8b86f3fe?role=subscribe&stream=input May 17 00:39:49.517073 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-01bf0261d8b86f3fe?role=subscribe&stream=input May 17 00:39:49.617034 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] Starting receiving message from control channel May 17 00:39:49.717370 amazon-ssm-agent[1784]: 2025-05-17 00:39:46 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 17 00:39:54.444323 amazon-ssm-agent[1784]: 2025-05-17 00:39:54 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 17 00:39:55.042363 systemd[1]: Created slice system-sshd.slice. May 17 00:39:55.044029 systemd[1]: Started sshd@0-172.31.25.158:22-139.178.68.195:52862.service. May 17 00:39:55.218832 sshd[1940]: Accepted publickey for core from 139.178.68.195 port 52862 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:55.221620 sshd[1940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:55.235471 systemd[1]: Created slice user-500.slice. May 17 00:39:55.236907 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:39:55.243049 systemd-logind[1731]: New session 1 of user core. May 17 00:39:55.250856 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:39:55.252874 systemd[1]: Starting user@500.service... May 17 00:39:55.258325 (systemd)[1943]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:55.352474 systemd[1943]: Queued start job for default target default.target. May 17 00:39:55.353164 systemd[1943]: Reached target paths.target. May 17 00:39:55.353200 systemd[1943]: Reached target sockets.target. May 17 00:39:55.353218 systemd[1943]: Reached target timers.target. May 17 00:39:55.353236 systemd[1943]: Reached target basic.target. May 17 00:39:55.353363 systemd[1]: Started user@500.service. May 17 00:39:55.354713 systemd[1]: Started session-1.scope. May 17 00:39:55.355552 systemd[1943]: Reached target default.target. May 17 00:39:55.355766 systemd[1943]: Startup finished in 90ms. May 17 00:39:55.492683 systemd[1]: Started sshd@1-172.31.25.158:22-139.178.68.195:52874.service. May 17 00:39:55.651359 sshd[1952]: Accepted publickey for core from 139.178.68.195 port 52874 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:55.652777 sshd[1952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:55.659878 systemd-logind[1731]: New session 2 of user core. May 17 00:39:55.660500 systemd[1]: Started session-2.scope. May 17 00:39:55.786054 sshd[1952]: pam_unix(sshd:session): session closed for user core May 17 00:39:55.788737 systemd[1]: sshd@1-172.31.25.158:22-139.178.68.195:52874.service: Deactivated successfully. May 17 00:39:55.789448 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:39:55.789943 systemd-logind[1731]: Session 2 logged out. Waiting for processes to exit. May 17 00:39:55.790761 systemd-logind[1731]: Removed session 2. May 17 00:39:55.811305 systemd[1]: Started sshd@2-172.31.25.158:22-139.178.68.195:52886.service. May 17 00:39:55.972199 sshd[1958]: Accepted publickey for core from 139.178.68.195 port 52886 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:55.974313 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:55.979384 systemd-logind[1731]: New session 3 of user core. May 17 00:39:55.980019 systemd[1]: Started session-3.scope. May 17 00:39:56.102625 sshd[1958]: pam_unix(sshd:session): session closed for user core May 17 00:39:56.105562 systemd[1]: sshd@2-172.31.25.158:22-139.178.68.195:52886.service: Deactivated successfully. May 17 00:39:56.106542 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:39:56.107250 systemd-logind[1731]: Session 3 logged out. Waiting for processes to exit. May 17 00:39:56.108109 systemd-logind[1731]: Removed session 3. May 17 00:39:56.128068 systemd[1]: Started sshd@3-172.31.25.158:22-139.178.68.195:52894.service. May 17 00:39:56.286452 sshd[1964]: Accepted publickey for core from 139.178.68.195 port 52894 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:56.287781 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:56.291970 systemd-logind[1731]: New session 4 of user core. May 17 00:39:56.292389 systemd[1]: Started session-4.scope. May 17 00:39:56.421865 sshd[1964]: pam_unix(sshd:session): session closed for user core May 17 00:39:56.424588 systemd[1]: sshd@3-172.31.25.158:22-139.178.68.195:52894.service: Deactivated successfully. May 17 00:39:56.425288 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:39:56.425847 systemd-logind[1731]: Session 4 logged out. Waiting for processes to exit. May 17 00:39:56.427062 systemd-logind[1731]: Removed session 4. May 17 00:39:56.447534 systemd[1]: Started sshd@4-172.31.25.158:22-139.178.68.195:52896.service. May 17 00:39:56.607921 sshd[1970]: Accepted publickey for core from 139.178.68.195 port 52896 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:56.608888 sshd[1970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:56.614322 systemd[1]: Started session-5.scope. May 17 00:39:56.615167 systemd-logind[1731]: New session 5 of user core. May 17 00:39:56.762468 sudo[1973]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:39:56.762832 sudo[1973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:56.771375 dbus-daemon[1722]: \xd0ma(\xd7U: received setenforce notice (enforcing=304467216) May 17 00:39:56.773355 sudo[1973]: pam_unix(sudo:session): session closed for user root May 17 00:39:56.797503 sshd[1970]: pam_unix(sshd:session): session closed for user core May 17 00:39:56.801304 systemd[1]: sshd@4-172.31.25.158:22-139.178.68.195:52896.service: Deactivated successfully. May 17 00:39:56.802260 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:39:56.803144 systemd-logind[1731]: Session 5 logged out. Waiting for processes to exit. May 17 00:39:56.804193 systemd-logind[1731]: Removed session 5. May 17 00:39:56.823789 systemd[1]: Started sshd@5-172.31.25.158:22-139.178.68.195:52898.service. May 17 00:39:56.988081 sshd[1977]: Accepted publickey for core from 139.178.68.195 port 52898 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:56.989811 sshd[1977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:56.995053 systemd[1]: Started session-6.scope. May 17 00:39:56.995408 systemd-logind[1731]: New session 6 of user core. May 17 00:39:57.103268 sudo[1981]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:39:57.103520 sudo[1981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:57.106845 sudo[1981]: pam_unix(sudo:session): session closed for user root May 17 00:39:57.112437 sudo[1980]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:39:57.112678 sudo[1980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:57.123348 systemd[1]: Stopping audit-rules.service... May 17 00:39:57.123000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:39:57.128515 kernel: kauditd_printk_skb: 233 callbacks suppressed May 17 00:39:57.128563 kernel: audit: type=1305 audit(1747442397.123:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:39:57.126461 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:39:57.128685 auditctl[1984]: No rules May 17 00:39:57.126671 systemd[1]: Stopped audit-rules.service. May 17 00:39:57.123000 audit[1984]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4b3d6930 a2=420 a3=0 items=0 ppid=1 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.133744 kernel: audit: type=1300 audit(1747442397.123:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4b3d6930 a2=420 a3=0 items=0 ppid=1 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.133449 systemd[1]: Starting audit-rules.service... May 17 00:39:57.123000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:39:57.139369 kernel: audit: type=1327 audit(1747442397.123:214): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:39:57.139493 kernel: audit: type=1131 audit(1747442397.125:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.153912 augenrules[2001]: No rules May 17 00:39:57.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.154732 systemd[1]: Finished audit-rules.service. May 17 00:39:57.158817 sudo[1980]: pam_unix(sudo:session): session closed for user root May 17 00:39:57.159158 kernel: audit: type=1130 audit(1747442397.153:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.157000 audit[1980]: USER_END pid=1980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.164142 kernel: audit: type=1106 audit(1747442397.157:217): pid=1980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.164244 kernel: audit: type=1104 audit(1747442397.157:218): pid=1980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.157000 audit[1980]: CRED_DISP pid=1980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.182314 sshd[1977]: pam_unix(sshd:session): session closed for user core May 17 00:39:57.182000 audit[1977]: USER_END pid=1977 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.185625 systemd-logind[1731]: Session 6 logged out. Waiting for processes to exit. May 17 00:39:57.187123 systemd[1]: sshd@5-172.31.25.158:22-139.178.68.195:52898.service: Deactivated successfully. May 17 00:39:57.187823 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:39:57.182000 audit[1977]: CRED_DISP pid=1977 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.189445 systemd-logind[1731]: Removed session 6. May 17 00:39:57.193923 kernel: audit: type=1106 audit(1747442397.182:219): pid=1977 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.194034 kernel: audit: type=1104 audit(1747442397.182:220): pid=1977 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.194068 kernel: audit: type=1131 audit(1747442397.182:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.158:22-139.178.68.195:52898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.158:22-139.178.68.195:52898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.158:22-139.178.68.195:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:57.208073 systemd[1]: Started sshd@6-172.31.25.158:22-139.178.68.195:52900.service. May 17 00:39:57.368000 audit[2007]: USER_ACCT pid=2007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.369985 sshd[2007]: Accepted publickey for core from 139.178.68.195 port 52900 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:39:57.370000 audit[2007]: CRED_ACQ pid=2007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.370000 audit[2007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffab276160 a2=3 a3=0 items=0 ppid=1 pid=2007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:57.371649 sshd[2007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:57.376813 systemd[1]: Started session-7.scope. May 17 00:39:57.377152 systemd-logind[1731]: New session 7 of user core. May 17 00:39:57.381000 audit[2007]: USER_START pid=2007 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.383000 audit[2009]: CRED_ACQ pid=2009 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:39:57.481000 audit[2010]: USER_ACCT pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.482000 audit[2010]: CRED_REFR pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.483130 sudo[2010]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:39:57.483368 sudo[2010]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:57.484000 audit[2010]: USER_START pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:57.510175 systemd[1]: Starting docker.service... May 17 00:39:57.555013 env[2020]: time="2025-05-17T00:39:57.554847503Z" level=info msg="Starting up" May 17 00:39:57.556492 env[2020]: time="2025-05-17T00:39:57.556459318Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:39:57.556492 env[2020]: time="2025-05-17T00:39:57.556481025Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:39:57.556634 env[2020]: time="2025-05-17T00:39:57.556504913Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:39:57.556634 env[2020]: time="2025-05-17T00:39:57.556518564Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:39:57.558341 env[2020]: time="2025-05-17T00:39:57.558312658Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:39:57.558341 env[2020]: time="2025-05-17T00:39:57.558333511Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:39:57.558341 env[2020]: time="2025-05-17T00:39:57.558418230Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:39:57.558341 env[2020]: time="2025-05-17T00:39:57.558433266Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:39:57.566272 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1727751142-merged.mount: Deactivated successfully. May 17 00:39:57.627055 env[2020]: time="2025-05-17T00:39:57.626920730Z" level=info msg="Loading containers: start." May 17 00:39:57.749000 audit[2050]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.749000 audit[2050]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff4408b6c0 a2=0 a3=7fff4408b6ac items=0 ppid=2020 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:39:57.751000 audit[2053]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.751000 audit[2053]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc40d2f290 a2=0 a3=7ffc40d2f27c items=0 ppid=2020 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:39:57.753000 audit[2055]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.753000 audit[2055]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe9adb9500 a2=0 a3=7ffe9adb94ec items=0 ppid=2020 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:39:57.755000 audit[2057]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.755000 audit[2057]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefa2de050 a2=0 a3=7ffefa2de03c items=0 ppid=2020 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:39:57.758000 audit[2059]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2059 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.758000 audit[2059]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc2c564550 a2=0 a3=7ffc2c56453c items=0 ppid=2020 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:39:57.776000 audit[2064]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.776000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb69fcfb0 a2=0 a3=7ffdb69fcf9c items=0 ppid=2020 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:39:57.785000 audit[2066]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.785000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1dda31e0 a2=0 a3=7ffd1dda31cc items=0 ppid=2020 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:39:57.787000 audit[2068]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.787000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdd0940110 a2=0 a3=7ffdd09400fc items=0 ppid=2020 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:39:57.789000 audit[2070]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.789000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc47a54d70 a2=0 a3=7ffc47a54d5c items=0 ppid=2020 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:39:57.799000 audit[2074]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2074 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.799000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffff562a090 a2=0 a3=7ffff562a07c items=0 ppid=2020 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:39:57.805000 audit[2075]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.805000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe09ffcac0 a2=0 a3=7ffe09ffcaac items=0 ppid=2020 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:39:57.843144 kernel: Initializing XFRM netlink socket May 17 00:39:57.906023 env[2020]: time="2025-05-17T00:39:57.905061135Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:39:57.908304 (udev-worker)[2030]: Network interface NamePolicy= disabled on kernel command line. May 17 00:39:57.929000 audit[2083]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.929000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd92447110 a2=0 a3=7ffd924470fc items=0 ppid=2020 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:39:57.941000 audit[2086]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2086 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.941000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcedfd6b70 a2=0 a3=7ffcedfd6b5c items=0 ppid=2020 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:39:57.945000 audit[2089]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.945000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc49ad88c0 a2=0 a3=7ffc49ad88ac items=0 ppid=2020 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:39:57.947000 audit[2091]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.947000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd96bdf8b0 a2=0 a3=7ffd96bdf89c items=0 ppid=2020 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.947000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:39:57.952000 audit[2093]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.952000 audit[2093]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffe40e9ad0 a2=0 a3=7fffe40e9abc items=0 ppid=2020 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.952000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:39:57.955000 audit[2095]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2095 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.955000 audit[2095]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff624b0780 a2=0 a3=7fff624b076c items=0 ppid=2020 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:39:57.957000 audit[2097]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.957000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff5f049c30 a2=0 a3=7fff5f049c1c items=0 ppid=2020 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:39:57.988000 audit[2100]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.988000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff5bfe9c00 a2=0 a3=7fff5bfe9bec items=0 ppid=2020 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:39:57.991000 audit[2102]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.991000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff16ddfec0 a2=0 a3=7fff16ddfeac items=0 ppid=2020 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.991000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:39:57.994000 audit[2104]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.994000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff4b8abc10 a2=0 a3=7fff4b8abbfc items=0 ppid=2020 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:39:57.996000 audit[2106]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:57.996000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff572950c0 a2=0 a3=7fff572950ac items=0 ppid=2020 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:57.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:39:57.998279 systemd-networkd[1462]: docker0: Link UP May 17 00:39:58.010000 audit[2110]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:58.010000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec39504e0 a2=0 a3=7ffec39504cc items=0 ppid=2020 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:58.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:39:58.016000 audit[2111]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:58.016000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc0967f830 a2=0 a3=7ffc0967f81c items=0 ppid=2020 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:58.016000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:39:58.017812 env[2020]: time="2025-05-17T00:39:58.017782582Z" level=info msg="Loading containers: done." May 17 00:39:58.037287 env[2020]: time="2025-05-17T00:39:58.037241369Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:39:58.037482 env[2020]: time="2025-05-17T00:39:58.037421397Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:39:58.037540 env[2020]: time="2025-05-17T00:39:58.037520358Z" level=info msg="Daemon has completed initialization" May 17 00:39:58.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:58.057294 systemd[1]: Started docker.service. May 17 00:39:58.064750 env[2020]: time="2025-05-17T00:39:58.064698620Z" level=info msg="API listen on /run/docker.sock" May 17 00:39:59.065948 env[1739]: time="2025-05-17T00:39:59.065906858Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\"" May 17 00:39:59.528157 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:39:59.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:59.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:59.528346 systemd[1]: Stopped kubelet.service. May 17 00:39:59.528406 systemd[1]: kubelet.service: Consumed 1.163s CPU time. May 17 00:39:59.529856 systemd[1]: Starting kubelet.service... May 17 00:39:59.659166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1368228662.mount: Deactivated successfully. May 17 00:39:59.784974 systemd[1]: Started kubelet.service. May 17 00:39:59.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:59.851626 kubelet[2146]: E0517 00:39:59.851589 2146 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:39:59.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:39:59.854886 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:39:59.855009 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:40:01.463417 env[1739]: time="2025-05-17T00:40:01.461638085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:01.473821 env[1739]: time="2025-05-17T00:40:01.473773606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:01.483675 env[1739]: time="2025-05-17T00:40:01.483626571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:01.486887 env[1739]: time="2025-05-17T00:40:01.486826678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0bee1bf751fe06009678c0cde7545443ba3a8d2edf71cea4c69cbb5774b9bf47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:01.487826 env[1739]: time="2025-05-17T00:40:01.487777591Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\" returns image reference \"sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4\"" May 17 00:40:01.489262 env[1739]: time="2025-05-17T00:40:01.489223630Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\"" May 17 00:40:03.816060 env[1739]: time="2025-05-17T00:40:03.815859489Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:03.823879 env[1739]: time="2025-05-17T00:40:03.823826487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:03.827850 env[1739]: time="2025-05-17T00:40:03.827802536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:03.830817 env[1739]: time="2025-05-17T00:40:03.830770993Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:79bcf2f5e614c336c02dcea9dfcdf485d7297aed6a21239a99c87f7164f9baca,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:03.832299 env[1739]: time="2025-05-17T00:40:03.832240654Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\" returns image reference \"sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00\"" May 17 00:40:03.833965 env[1739]: time="2025-05-17T00:40:03.833927938Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\"" May 17 00:40:05.272707 env[1739]: time="2025-05-17T00:40:05.272632947Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:05.276051 env[1739]: time="2025-05-17T00:40:05.276009198Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:05.278228 env[1739]: time="2025-05-17T00:40:05.278188221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:05.280979 env[1739]: time="2025-05-17T00:40:05.280938004Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:f0f39d8b9808c407cacb3a46a5a9ce4d4a4a7cf3b674ba4bd221f5bc90051d2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:05.281749 env[1739]: time="2025-05-17T00:40:05.281712412Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\" returns image reference \"sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a\"" May 17 00:40:05.283211 env[1739]: time="2025-05-17T00:40:05.283177996Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:40:06.431422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1053894084.mount: Deactivated successfully. May 17 00:40:07.185850 env[1739]: time="2025-05-17T00:40:07.185778284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.188424 env[1739]: time="2025-05-17T00:40:07.188381394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.190664 env[1739]: time="2025-05-17T00:40:07.190617680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.192515 env[1739]: time="2025-05-17T00:40:07.192484511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.192797 env[1739]: time="2025-05-17T00:40:07.192766675Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:40:07.193333 env[1739]: time="2025-05-17T00:40:07.193310156Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:40:07.709022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1944772312.mount: Deactivated successfully. May 17 00:40:08.737774 env[1739]: time="2025-05-17T00:40:08.737711261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:08.741088 env[1739]: time="2025-05-17T00:40:08.741041560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:08.744528 env[1739]: time="2025-05-17T00:40:08.744482307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:08.746515 env[1739]: time="2025-05-17T00:40:08.746468770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:08.747435 env[1739]: time="2025-05-17T00:40:08.747396458Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:40:08.748051 env[1739]: time="2025-05-17T00:40:08.748021508Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:40:09.189178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4197034665.mount: Deactivated successfully. May 17 00:40:09.195052 env[1739]: time="2025-05-17T00:40:09.194989910Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:09.196873 env[1739]: time="2025-05-17T00:40:09.196813934Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:09.198809 env[1739]: time="2025-05-17T00:40:09.198758042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:09.200492 env[1739]: time="2025-05-17T00:40:09.200454956Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:09.201164 env[1739]: time="2025-05-17T00:40:09.201128776Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:40:09.201748 env[1739]: time="2025-05-17T00:40:09.201722715Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 17 00:40:09.698063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2594381757.mount: Deactivated successfully. May 17 00:40:10.038160 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:40:10.038425 kernel: audit: type=1130 audit(1747442410.027:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:10.038464 kernel: audit: type=1131 audit(1747442410.027:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:10.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:10.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:10.028385 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:40:10.028642 systemd[1]: Stopped kubelet.service. May 17 00:40:10.035102 systemd[1]: Starting kubelet.service... May 17 00:40:10.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:10.374098 systemd[1]: Started kubelet.service. May 17 00:40:10.378360 kernel: audit: type=1130 audit(1747442410.373:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:10.443217 kubelet[2155]: E0517 00:40:10.443175 2155 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:40:10.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:40:10.445625 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:40:10.445790 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:40:10.450141 kernel: audit: type=1131 audit(1747442410.444:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:40:12.070355 env[1739]: time="2025-05-17T00:40:12.070294772Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:12.073175 env[1739]: time="2025-05-17T00:40:12.073134066Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:12.075880 env[1739]: time="2025-05-17T00:40:12.075837108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:12.078421 env[1739]: time="2025-05-17T00:40:12.078381254Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:12.079317 env[1739]: time="2025-05-17T00:40:12.079251255Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 17 00:40:14.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:14.413768 systemd[1]: Stopped kubelet.service. May 17 00:40:14.421597 kernel: audit: type=1130 audit(1747442414.412:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:14.421723 kernel: audit: type=1131 audit(1747442414.415:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:14.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:14.421013 systemd[1]: Starting kubelet.service... May 17 00:40:14.456127 systemd[1]: Reloading. May 17 00:40:14.563017 /usr/lib/systemd/system-generators/torcx-generator[2205]: time="2025-05-17T00:40:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:40:14.563047 /usr/lib/systemd/system-generators/torcx-generator[2205]: time="2025-05-17T00:40:14Z" level=info msg="torcx already run" May 17 00:40:14.688419 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:40:14.688441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:40:14.715556 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:40:14.822278 kernel: audit: type=1400 audit(1747442414.814:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.822420 kernel: audit: type=1400 audit(1747442414.815:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834799 kernel: audit: type=1400 audit(1747442414.815:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834933 kernel: audit: type=1400 audit(1747442414.815:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit: BPF prog-id=46 op=LOAD May 17 00:40:14.821000 audit: BPF prog-id=27 op=UNLOAD May 17 00:40:14.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.821000 audit: BPF prog-id=47 op=LOAD May 17 00:40:14.821000 audit: BPF prog-id=44 op=UNLOAD May 17 00:40:14.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit: BPF prog-id=48 op=LOAD May 17 00:40:14.833000 audit: BPF prog-id=38 op=UNLOAD May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit: BPF prog-id=49 op=LOAD May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.833000 audit: BPF prog-id=50 op=LOAD May 17 00:40:14.833000 audit: BPF prog-id=39 op=UNLOAD May 17 00:40:14.833000 audit: BPF prog-id=40 op=UNLOAD May 17 00:40:14.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.834000 audit: BPF prog-id=51 op=LOAD May 17 00:40:14.834000 audit: BPF prog-id=28 op=UNLOAD May 17 00:40:14.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.839000 audit: BPF prog-id=54 op=LOAD May 17 00:40:14.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit: BPF prog-id=55 op=LOAD May 17 00:40:14.840000 audit: BPF prog-id=31 op=UNLOAD May 17 00:40:14.840000 audit: BPF prog-id=32 op=UNLOAD May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit: BPF prog-id=56 op=LOAD May 17 00:40:14.841000 audit: BPF prog-id=41 op=UNLOAD May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit: BPF prog-id=57 op=LOAD May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.841000 audit: BPF prog-id=58 op=LOAD May 17 00:40:14.841000 audit: BPF prog-id=42 op=UNLOAD May 17 00:40:14.841000 audit: BPF prog-id=43 op=UNLOAD May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit: BPF prog-id=59 op=LOAD May 17 00:40:14.842000 audit: BPF prog-id=33 op=UNLOAD May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit: BPF prog-id=60 op=LOAD May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit: BPF prog-id=61 op=LOAD May 17 00:40:14.843000 audit: BPF prog-id=34 op=UNLOAD May 17 00:40:14.843000 audit: BPF prog-id=35 op=UNLOAD May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.844000 audit: BPF prog-id=62 op=LOAD May 17 00:40:14.844000 audit: BPF prog-id=37 op=UNLOAD May 17 00:40:14.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:14.846000 audit: BPF prog-id=63 op=LOAD May 17 00:40:14.846000 audit: BPF prog-id=36 op=UNLOAD May 17 00:40:14.889806 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:40:14.890054 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:40:14.890426 systemd[1]: Stopped kubelet.service. May 17 00:40:14.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:40:14.892843 systemd[1]: Starting kubelet.service... May 17 00:40:15.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:15.300186 systemd[1]: Started kubelet.service. May 17 00:40:15.303312 kernel: kauditd_printk_skb: 247 callbacks suppressed May 17 00:40:15.303384 kernel: audit: type=1130 audit(1747442415.299:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:15.372167 kubelet[2264]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:40:15.372560 kubelet[2264]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:40:15.372607 kubelet[2264]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:40:15.372756 kubelet[2264]: I0517 00:40:15.372733 2264 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:40:15.934847 kubelet[2264]: I0517 00:40:15.934800 2264 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:40:15.934847 kubelet[2264]: I0517 00:40:15.934835 2264 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:40:15.935273 kubelet[2264]: I0517 00:40:15.935249 2264 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:40:15.977189 kubelet[2264]: E0517 00:40:15.977141 2264 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.25.158:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:15.982366 kubelet[2264]: I0517 00:40:15.982330 2264 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:40:15.992703 kubelet[2264]: E0517 00:40:15.992664 2264 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:40:15.992703 kubelet[2264]: I0517 00:40:15.992694 2264 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:40:15.995929 kubelet[2264]: I0517 00:40:15.995895 2264 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:40:15.996154 kubelet[2264]: I0517 00:40:15.996127 2264 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:40:15.996411 kubelet[2264]: I0517 00:40:15.996157 2264 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-25-158","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:40:15.996519 kubelet[2264]: I0517 00:40:15.996424 2264 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:40:15.996519 kubelet[2264]: I0517 00:40:15.996435 2264 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:40:15.996573 kubelet[2264]: I0517 00:40:15.996542 2264 state_mem.go:36] "Initialized new in-memory state store" May 17 00:40:16.006341 kubelet[2264]: I0517 00:40:16.005413 2264 kubelet.go:446] "Attempting to sync node with API server" May 17 00:40:16.006341 kubelet[2264]: I0517 00:40:16.005454 2264 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:40:16.006341 kubelet[2264]: I0517 00:40:16.005476 2264 kubelet.go:352] "Adding apiserver pod source" May 17 00:40:16.006341 kubelet[2264]: I0517 00:40:16.005487 2264 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:40:16.046104 kubelet[2264]: W0517 00:40:16.046038 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.25.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-158&limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:16.046546 kubelet[2264]: E0517 00:40:16.046520 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.25.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-158&limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:16.046763 kubelet[2264]: I0517 00:40:16.046745 2264 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:40:16.047252 kubelet[2264]: I0517 00:40:16.047224 2264 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:40:16.050332 kubelet[2264]: W0517 00:40:16.050304 2264 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:40:16.053016 kubelet[2264]: W0517 00:40:16.052632 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.25.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:16.053016 kubelet[2264]: E0517 00:40:16.052686 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.25.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:16.060850 kubelet[2264]: I0517 00:40:16.060789 2264 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:40:16.060850 kubelet[2264]: I0517 00:40:16.060849 2264 server.go:1287] "Started kubelet" May 17 00:40:16.064999 kubelet[2264]: I0517 00:40:16.064945 2264 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:40:16.065808 kubelet[2264]: I0517 00:40:16.065761 2264 server.go:479] "Adding debug handlers to kubelet server" May 17 00:40:16.079828 kernel: audit: type=1400 audit(1747442416.066:452): avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:16.079946 kernel: audit: type=1401 audit(1747442416.066:452): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:16.079971 kernel: audit: type=1300 audit(1747442416.066:452): arch=c000003e syscall=188 success=no exit=-22 a0=c0009f00c0 a1=c000684960 a2=c0009f0090 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.066000 audit[2264]: AVC avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:16.066000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:16.066000 audit[2264]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009f00c0 a1=c000684960 a2=c0009f0090 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.067954 2264 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.067984 2264 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.068042 2264 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.072847 2264 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.074239 2264 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:40:16.080221 kubelet[2264]: E0517 00:40:16.074417 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.076810 2264 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:40:16.080221 kubelet[2264]: I0517 00:40:16.076851 2264 reconciler.go:26] "Reconciler: start to sync state" May 17 00:40:16.082622 kubelet[2264]: I0517 00:40:16.082558 2264 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:40:16.082910 kubelet[2264]: I0517 00:40:16.082899 2264 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:40:16.085457 kubelet[2264]: E0517 00:40:16.085433 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="200ms" May 17 00:40:16.066000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:16.092756 kernel: audit: type=1327 audit(1747442416.066:452): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:16.066000 audit[2264]: AVC avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:16.099497 kernel: audit: type=1400 audit(1747442416.066:453): avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:16.099553 kubelet[2264]: W0517 00:40:16.098969 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.25.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:16.099553 kubelet[2264]: E0517 00:40:16.099041 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.25.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:16.100086 kubelet[2264]: I0517 00:40:16.100065 2264 factory.go:221] Registration of the systemd container factory successfully May 17 00:40:16.100301 kubelet[2264]: I0517 00:40:16.100286 2264 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:40:16.102247 kubelet[2264]: I0517 00:40:16.102232 2264 factory.go:221] Registration of the containerd container factory successfully May 17 00:40:16.114458 kernel: audit: type=1401 audit(1747442416.066:453): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:16.114562 kernel: audit: type=1300 audit(1747442416.066:453): arch=c000003e syscall=188 success=no exit=-22 a0=c0008719c0 a1=c000684978 a2=c0009f0150 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.066000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:16.066000 audit[2264]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008719c0 a1=c000684978 a2=c0009f0150 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.114699 kubelet[2264]: I0517 00:40:16.110790 2264 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:40:16.114699 kubelet[2264]: I0517 00:40:16.112826 2264 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:40:16.114699 kubelet[2264]: I0517 00:40:16.112846 2264 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:40:16.114699 kubelet[2264]: I0517 00:40:16.112871 2264 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:40:16.114699 kubelet[2264]: I0517 00:40:16.112879 2264 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:40:16.114699 kubelet[2264]: E0517 00:40:16.112931 2264 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:40:16.123212 kernel: audit: type=1327 audit(1747442416.066:453): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:16.066000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:16.069000 audit[2275]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.123926 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:40:16.130569 kernel: audit: type=1325 audit(1747442416.069:454): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.130658 kubelet[2264]: E0517 00:40:16.099188 2264 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.25.158:6443/api/v1/namespaces/default/events\": dial tcp 172.31.25.158:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-25-158.1840299e7ac183ab default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-25-158,UID:ip-172-31-25-158,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-25-158,},FirstTimestamp:2025-05-17 00:40:16.060826539 +0000 UTC m=+0.753328551,LastTimestamp:2025-05-17 00:40:16.060826539 +0000 UTC m=+0.753328551,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-25-158,}" May 17 00:40:16.130658 kubelet[2264]: W0517 00:40:16.128626 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.25.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:16.130658 kubelet[2264]: E0517 00:40:16.128677 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.25.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:16.069000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffbcb1f420 a2=0 a3=7fffbcb1f40c items=0 ppid=2264 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:40:16.070000 audit[2276]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.070000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff708481e0 a2=0 a3=7fff708481cc items=0 ppid=2264 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:40:16.074000 audit[2278]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.074000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef0492ac0 a2=0 a3=7ffef0492aac items=0 ppid=2264 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:40:16.076000 audit[2280]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.076000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3e71d190 a2=0 a3=7ffd3e71d17c items=0 ppid=2264 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:40:16.107000 audit[2283]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.107000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffece2eb530 a2=0 a3=7ffece2eb51c items=0 ppid=2264 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:40:16.111000 audit[2286]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:16.111000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4ddf6f90 a2=0 a3=7ffd4ddf6f7c items=0 ppid=2264 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:40:16.112000 audit[2288]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.112000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff56df3f50 a2=0 a3=7fff56df3f3c items=0 ppid=2264 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:40:16.116000 audit[2289]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:16.116000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffebd47260 a2=0 a3=7fffebd4724c items=0 ppid=2264 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:40:16.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:16.133000 audit[2290]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.133000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb36c3010 a2=0 a3=7ffeb36c2ffc items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:40:16.133000 audit[2293]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:16.133000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2c99b740 a2=0 a3=7ffc2c99b72c items=0 ppid=2264 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:40:16.136000 audit[2296]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:16.136000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc17ac6c50 a2=0 a3=7ffc17ac6c3c items=0 ppid=2264 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:40:16.138408 kubelet[2264]: I0517 00:40:16.138386 2264 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:40:16.138408 kubelet[2264]: I0517 00:40:16.138403 2264 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:40:16.138530 kubelet[2264]: I0517 00:40:16.138419 2264 state_mem.go:36] "Initialized new in-memory state store" May 17 00:40:16.140859 kubelet[2264]: I0517 00:40:16.140840 2264 policy_none.go:49] "None policy: Start" May 17 00:40:16.140000 audit[2297]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:16.140000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3626be50 a2=0 a3=7ffe3626be3c items=0 ppid=2264 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:40:16.142270 kubelet[2264]: I0517 00:40:16.142250 2264 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:40:16.142341 kubelet[2264]: I0517 00:40:16.142287 2264 state_mem.go:35] "Initializing new in-memory state store" May 17 00:40:16.144000 audit: BPF prog-id=58 op=UNLOAD May 17 00:40:16.144000 audit: BPF prog-id=57 op=UNLOAD May 17 00:40:16.144000 audit: BPF prog-id=56 op=UNLOAD May 17 00:40:16.148703 systemd[1]: Created slice kubepods.slice. May 17 00:40:16.153359 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:40:16.156846 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:40:16.163731 kubelet[2264]: I0517 00:40:16.163712 2264 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:40:16.162000 audit[2264]: AVC avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:16.162000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:16.162000 audit[2264]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bddb30 a1=c000acf4b8 a2=c000bddb00 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:16.162000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:16.164593 kubelet[2264]: I0517 00:40:16.164192 2264 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:40:16.164675 kubelet[2264]: I0517 00:40:16.164661 2264 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:40:16.164714 kubelet[2264]: I0517 00:40:16.164678 2264 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:40:16.164959 kubelet[2264]: I0517 00:40:16.164946 2264 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:40:16.166492 kubelet[2264]: E0517 00:40:16.166477 2264 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:40:16.166614 kubelet[2264]: E0517 00:40:16.166606 2264 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-25-158\" not found" May 17 00:40:16.239493 systemd[1]: Created slice kubepods-burstable-pode1d679cdaaff4d088c8fb7ecb63ac331.slice. May 17 00:40:16.249972 kubelet[2264]: E0517 00:40:16.249945 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:16.252339 systemd[1]: Created slice kubepods-burstable-pod70fa76da26a8adca76b10df8fd3eea3d.slice. May 17 00:40:16.254965 kubelet[2264]: E0517 00:40:16.254930 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:16.257810 systemd[1]: Created slice kubepods-burstable-podc789ad07624521905346189b10ac8f9f.slice. May 17 00:40:16.260105 kubelet[2264]: E0517 00:40:16.260082 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:16.266441 kubelet[2264]: I0517 00:40:16.266406 2264 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-25-158" May 17 00:40:16.266783 kubelet[2264]: E0517 00:40:16.266754 2264 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.25.158:6443/api/v1/nodes\": dial tcp 172.31.25.158:6443: connect: connection refused" node="ip-172-31-25-158" May 17 00:40:16.286928 kubelet[2264]: E0517 00:40:16.286889 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="400ms" May 17 00:40:16.377511 kubelet[2264]: I0517 00:40:16.377468 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:16.377511 kubelet[2264]: I0517 00:40:16.377514 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c789ad07624521905346189b10ac8f9f-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-158\" (UID: \"c789ad07624521905346189b10ac8f9f\") " pod="kube-system/kube-scheduler-ip-172-31-25-158" May 17 00:40:16.377511 kubelet[2264]: I0517 00:40:16.377534 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e1d679cdaaff4d088c8fb7ecb63ac331-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-158\" (UID: \"e1d679cdaaff4d088c8fb7ecb63ac331\") " pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:16.377991 kubelet[2264]: I0517 00:40:16.377550 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e1d679cdaaff4d088c8fb7ecb63ac331-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-158\" (UID: \"e1d679cdaaff4d088c8fb7ecb63ac331\") " pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:16.377991 kubelet[2264]: I0517 00:40:16.377567 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:16.377991 kubelet[2264]: I0517 00:40:16.377582 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:16.377991 kubelet[2264]: I0517 00:40:16.377596 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e1d679cdaaff4d088c8fb7ecb63ac331-ca-certs\") pod \"kube-apiserver-ip-172-31-25-158\" (UID: \"e1d679cdaaff4d088c8fb7ecb63ac331\") " pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:16.377991 kubelet[2264]: I0517 00:40:16.377612 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:16.378245 kubelet[2264]: I0517 00:40:16.377652 2264 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:16.468908 kubelet[2264]: I0517 00:40:16.468866 2264 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-25-158" May 17 00:40:16.469227 kubelet[2264]: E0517 00:40:16.469192 2264 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.25.158:6443/api/v1/nodes\": dial tcp 172.31.25.158:6443: connect: connection refused" node="ip-172-31-25-158" May 17 00:40:16.552270 env[1739]: time="2025-05-17T00:40:16.552175076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-158,Uid:e1d679cdaaff4d088c8fb7ecb63ac331,Namespace:kube-system,Attempt:0,}" May 17 00:40:16.556850 env[1739]: time="2025-05-17T00:40:16.556800942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-158,Uid:70fa76da26a8adca76b10df8fd3eea3d,Namespace:kube-system,Attempt:0,}" May 17 00:40:16.562007 env[1739]: time="2025-05-17T00:40:16.561967098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-158,Uid:c789ad07624521905346189b10ac8f9f,Namespace:kube-system,Attempt:0,}" May 17 00:40:16.688436 kubelet[2264]: E0517 00:40:16.688393 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="800ms" May 17 00:40:16.872475 kubelet[2264]: I0517 00:40:16.872378 2264 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-25-158" May 17 00:40:16.873043 kubelet[2264]: E0517 00:40:16.873007 2264 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.25.158:6443/api/v1/nodes\": dial tcp 172.31.25.158:6443: connect: connection refused" node="ip-172-31-25-158" May 17 00:40:16.922705 kubelet[2264]: W0517 00:40:16.922622 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.25.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-158&limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:16.922705 kubelet[2264]: E0517 00:40:16.922693 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.25.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-158&limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:17.008248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount972173975.mount: Deactivated successfully. May 17 00:40:17.017999 env[1739]: time="2025-05-17T00:40:17.017940039Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.018880 env[1739]: time="2025-05-17T00:40:17.018833973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.023447 env[1739]: time="2025-05-17T00:40:17.023403589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.024520 env[1739]: time="2025-05-17T00:40:17.024490729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.025833 env[1739]: time="2025-05-17T00:40:17.025798182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.028967 env[1739]: time="2025-05-17T00:40:17.028928351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.029738 env[1739]: time="2025-05-17T00:40:17.029693282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.031435 env[1739]: time="2025-05-17T00:40:17.031383392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.035045 env[1739]: time="2025-05-17T00:40:17.034435596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.037071 env[1739]: time="2025-05-17T00:40:17.037030696Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.040653 env[1739]: time="2025-05-17T00:40:17.040617741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.042508 env[1739]: time="2025-05-17T00:40:17.042468586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.075649 env[1739]: time="2025-05-17T00:40:17.072489184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:17.075649 env[1739]: time="2025-05-17T00:40:17.072554832Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:17.075649 env[1739]: time="2025-05-17T00:40:17.072572983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:17.075649 env[1739]: time="2025-05-17T00:40:17.072851386Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb pid=2305 runtime=io.containerd.runc.v2 May 17 00:40:17.093152 env[1739]: time="2025-05-17T00:40:17.093036761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:17.093451 env[1739]: time="2025-05-17T00:40:17.093418698Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:17.093565 env[1739]: time="2025-05-17T00:40:17.093539844Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:17.093885 env[1739]: time="2025-05-17T00:40:17.093851552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954 pid=2325 runtime=io.containerd.runc.v2 May 17 00:40:17.104551 systemd[1]: Started cri-containerd-f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb.scope. May 17 00:40:17.135814 env[1739]: time="2025-05-17T00:40:17.135586768Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:17.136396 env[1739]: time="2025-05-17T00:40:17.136292391Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:17.136721 env[1739]: time="2025-05-17T00:40:17.136668740Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:17.137188 env[1739]: time="2025-05-17T00:40:17.137149553Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d00588cfec9444e179020c2d9a8b661c3d9c27289d4985dda865e10d6f282482 pid=2361 runtime=io.containerd.runc.v2 May 17 00:40:17.139493 kubelet[2264]: W0517 00:40:17.139354 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.25.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:17.139493 kubelet[2264]: E0517 00:40:17.139452 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.25.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.141000 audit: BPF prog-id=64 op=LOAD May 17 00:40:17.143000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.143000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2305 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630666133383862613838646432633036343230393364373537663665 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2305 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630666133383862613838646432633036343230393364373537663665 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.144000 audit: BPF prog-id=65 op=LOAD May 17 00:40:17.144000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003e8e30 items=0 ppid=2305 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630666133383862613838646432633036343230393364373537663665 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.145000 audit: BPF prog-id=66 op=LOAD May 17 00:40:17.145000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003e8e78 items=0 ppid=2305 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630666133383862613838646432633036343230393364373537663665 May 17 00:40:17.147000 audit: BPF prog-id=66 op=UNLOAD May 17 00:40:17.147000 audit: BPF prog-id=65 op=UNLOAD May 17 00:40:17.147000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.147000 audit: BPF prog-id=67 op=LOAD May 17 00:40:17.147000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e9288 items=0 ppid=2305 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630666133383862613838646432633036343230393364373537663665 May 17 00:40:17.161453 systemd[1]: Started cri-containerd-8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954.scope. May 17 00:40:17.163264 kubelet[2264]: W0517 00:40:17.162593 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.25.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:17.163264 kubelet[2264]: E0517 00:40:17.162671 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.25.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:17.193338 systemd[1]: Started cri-containerd-d00588cfec9444e179020c2d9a8b661c3d9c27289d4985dda865e10d6f282482.scope. May 17 00:40:17.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.196000 audit: BPF prog-id=68 op=LOAD May 17 00:40:17.197000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.197000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2325 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866303938336639643234656239336566663561396236653438376465 May 17 00:40:17.197000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.197000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2325 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866303938336639643234656239336566663561396236653438376465 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.200000 audit: BPF prog-id=69 op=LOAD May 17 00:40:17.200000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002858a0 items=0 ppid=2325 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866303938336639643234656239336566663561396236653438376465 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.201000 audit: BPF prog-id=70 op=LOAD May 17 00:40:17.201000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002858e8 items=0 ppid=2325 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866303938336639643234656239336566663561396236653438376465 May 17 00:40:17.202000 audit: BPF prog-id=70 op=UNLOAD May 17 00:40:17.202000 audit: BPF prog-id=69 op=UNLOAD May 17 00:40:17.202000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.202000 audit: BPF prog-id=71 op=LOAD May 17 00:40:17.202000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000285cf8 items=0 ppid=2325 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866303938336639643234656239336566663561396236653438376465 May 17 00:40:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.230000 audit: BPF prog-id=72 op=LOAD May 17 00:40:17.232637 env[1739]: time="2025-05-17T00:40:17.232592967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-158,Uid:c789ad07624521905346189b10ac8f9f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb\"" May 17 00:40:17.236185 env[1739]: time="2025-05-17T00:40:17.236108371Z" level=info msg="CreateContainer within sandbox \"f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:40:17.236000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.236000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2361 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430303538386366656339343434653137393032306332643961386236 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2361 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430303538386366656339343434653137393032306332643961386236 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.238000 audit: BPF prog-id=73 op=LOAD May 17 00:40:17.238000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028e740 items=0 ppid=2361 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430303538386366656339343434653137393032306332643961386236 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit: BPF prog-id=74 op=LOAD May 17 00:40:17.241000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028e788 items=0 ppid=2361 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430303538386366656339343434653137393032306332643961386236 May 17 00:40:17.241000 audit: BPF prog-id=74 op=UNLOAD May 17 00:40:17.241000 audit: BPF prog-id=73 op=UNLOAD May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.241000 audit: BPF prog-id=75 op=LOAD May 17 00:40:17.241000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028eb98 items=0 ppid=2361 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430303538386366656339343434653137393032306332643961386236 May 17 00:40:17.255163 env[1739]: time="2025-05-17T00:40:17.255105692Z" level=info msg="CreateContainer within sandbox \"f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a\"" May 17 00:40:17.257405 env[1739]: time="2025-05-17T00:40:17.257364084Z" level=info msg="StartContainer for \"e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a\"" May 17 00:40:17.263649 env[1739]: time="2025-05-17T00:40:17.263598344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-158,Uid:70fa76da26a8adca76b10df8fd3eea3d,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954\"" May 17 00:40:17.269755 env[1739]: time="2025-05-17T00:40:17.269712431Z" level=info msg="CreateContainer within sandbox \"8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:40:17.294325 systemd[1]: Started cri-containerd-e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a.scope. May 17 00:40:17.297736 env[1739]: time="2025-05-17T00:40:17.297685113Z" level=info msg="CreateContainer within sandbox \"8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4\"" May 17 00:40:17.300459 env[1739]: time="2025-05-17T00:40:17.300421950Z" level=info msg="StartContainer for \"2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4\"" May 17 00:40:17.322051 env[1739]: time="2025-05-17T00:40:17.321990218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-158,Uid:e1d679cdaaff4d088c8fb7ecb63ac331,Namespace:kube-system,Attempt:0,} returns sandbox id \"d00588cfec9444e179020c2d9a8b661c3d9c27289d4985dda865e10d6f282482\"" May 17 00:40:17.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit: BPF prog-id=76 op=LOAD May 17 00:40:17.326000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2305 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313565326235333031343462393931323433616638633534643466 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2305 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313565326235333031343462393931323433616638633534643466 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.326000 audit: BPF prog-id=77 op=LOAD May 17 00:40:17.326000 audit[2423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b090 items=0 ppid=2305 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313565326235333031343462393931323433616638633534643466 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit: BPF prog-id=78 op=LOAD May 17 00:40:17.327000 audit[2423]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b0d8 items=0 ppid=2305 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313565326235333031343462393931323433616638633534643466 May 17 00:40:17.327000 audit: BPF prog-id=78 op=UNLOAD May 17 00:40:17.327000 audit: BPF prog-id=77 op=UNLOAD May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.327000 audit: BPF prog-id=79 op=LOAD May 17 00:40:17.327000 audit[2423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b4e8 items=0 ppid=2305 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313565326235333031343462393931323433616638633534643466 May 17 00:40:17.332388 kubelet[2264]: W0517 00:40:17.332330 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.25.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:17.332514 kubelet[2264]: E0517 00:40:17.332407 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.25.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:17.346598 env[1739]: time="2025-05-17T00:40:17.346545597Z" level=info msg="CreateContainer within sandbox \"d00588cfec9444e179020c2d9a8b661c3d9c27289d4985dda865e10d6f282482\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:40:17.353854 systemd[1]: Started cri-containerd-2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4.scope. May 17 00:40:17.374568 env[1739]: time="2025-05-17T00:40:17.374518064Z" level=info msg="CreateContainer within sandbox \"d00588cfec9444e179020c2d9a8b661c3d9c27289d4985dda865e10d6f282482\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"62bc09e8d8afbbc576a9bb5cd0aa426005e09a3c2c642e5428cb80f0298cbcc0\"" May 17 00:40:17.375133 env[1739]: time="2025-05-17T00:40:17.375083983Z" level=info msg="StartContainer for \"62bc09e8d8afbbc576a9bb5cd0aa426005e09a3c2c642e5428cb80f0298cbcc0\"" May 17 00:40:17.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.394000 audit: BPF prog-id=80 op=LOAD May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2325 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313333656361646637643865663232353965323561633962363063 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2325 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313333656361646637643865663232353965323561633962363063 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit: BPF prog-id=81 op=LOAD May 17 00:40:17.396000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c6fc0 items=0 ppid=2325 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313333656361646637643865663232353965323561633962363063 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.396000 audit: BPF prog-id=82 op=LOAD May 17 00:40:17.396000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c7008 items=0 ppid=2325 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313333656361646637643865663232353965323561633962363063 May 17 00:40:17.396000 audit: BPF prog-id=82 op=UNLOAD May 17 00:40:17.396000 audit: BPF prog-id=81 op=UNLOAD May 17 00:40:17.397000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.397000 audit: BPF prog-id=83 op=LOAD May 17 00:40:17.397000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c7418 items=0 ppid=2325 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313333656361646637643865663232353965323561633962363063 May 17 00:40:17.416359 env[1739]: time="2025-05-17T00:40:17.416311640Z" level=info msg="StartContainer for \"e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a\" returns successfully" May 17 00:40:17.418383 systemd[1]: Started cri-containerd-62bc09e8d8afbbc576a9bb5cd0aa426005e09a3c2c642e5428cb80f0298cbcc0.scope. May 17 00:40:17.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit: BPF prog-id=84 op=LOAD May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2361 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632626330396538643861666262633537366139626235636430616134 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2361 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632626330396538643861666262633537366139626235636430616134 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit: BPF prog-id=85 op=LOAD May 17 00:40:17.443000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c6130 items=0 ppid=2361 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632626330396538643861666262633537366139626235636430616134 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit: BPF prog-id=86 op=LOAD May 17 00:40:17.443000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c6178 items=0 ppid=2361 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632626330396538643861666262633537366139626235636430616134 May 17 00:40:17.443000 audit: BPF prog-id=86 op=UNLOAD May 17 00:40:17.443000 audit: BPF prog-id=85 op=UNLOAD May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.443000 audit: BPF prog-id=87 op=LOAD May 17 00:40:17.443000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6588 items=0 ppid=2361 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632626330396538643861666262633537366139626235636430616134 May 17 00:40:17.470865 env[1739]: time="2025-05-17T00:40:17.470811801Z" level=info msg="StartContainer for \"2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4\" returns successfully" May 17 00:40:17.489536 kubelet[2264]: E0517 00:40:17.489484 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="1.6s" May 17 00:40:17.502675 env[1739]: time="2025-05-17T00:40:17.502617061Z" level=info msg="StartContainer for \"62bc09e8d8afbbc576a9bb5cd0aa426005e09a3c2c642e5428cb80f0298cbcc0\" returns successfully" May 17 00:40:17.677844 kubelet[2264]: I0517 00:40:17.675432 2264 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-25-158" May 17 00:40:17.677844 kubelet[2264]: E0517 00:40:17.675857 2264 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.25.158:6443/api/v1/nodes\": dial tcp 172.31.25.158:6443: connect: connection refused" node="ip-172-31-25-158" May 17 00:40:18.139534 kubelet[2264]: E0517 00:40:18.139504 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:18.144401 kubelet[2264]: E0517 00:40:18.144375 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:18.145220 kubelet[2264]: E0517 00:40:18.145183 2264 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.25.158:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:18.148384 kubelet[2264]: E0517 00:40:18.148362 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:18.809759 kubelet[2264]: W0517 00:40:18.809720 2264 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.25.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-158&limit=500&resourceVersion=0": dial tcp 172.31.25.158:6443: connect: connection refused May 17 00:40:18.810341 kubelet[2264]: E0517 00:40:18.810315 2264 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.25.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-158&limit=500&resourceVersion=0\": dial tcp 172.31.25.158:6443: connect: connection refused" logger="UnhandledError" May 17 00:40:19.013000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:19.013000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00007a120 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:19.013000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:19.014000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:19.014000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0001541c0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:19.014000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:19.151975 kubelet[2264]: E0517 00:40:19.151506 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:19.152597 kubelet[2264]: E0517 00:40:19.152577 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:19.153251 kubelet[2264]: E0517 00:40:19.152954 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:19.278012 kubelet[2264]: I0517 00:40:19.277987 2264 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-25-158" May 17 00:40:20.152468 kubelet[2264]: E0517 00:40:20.152441 2264 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-25-158\" not found" node="ip-172-31-25-158" May 17 00:40:20.392153 kernel: kauditd_printk_skb: 391 callbacks suppressed May 17 00:40:20.392290 kernel: audit: type=1400 audit(1747442420.388:581): avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.388000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.388000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0038ec210 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.405982 kernel: audit: type=1300 audit(1747442420.388:581): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0038ec210 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.419181 kernel: audit: type=1327 audit(1747442420.388:581): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.405000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.430790 kernel: audit: type=1400 audit(1747442420.405:582): avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.405000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002088c40 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.441535 kernel: audit: type=1300 audit(1747442420.405:582): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002088c40 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.441633 kernel: audit: type=1327 audit(1747442420.405:582): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.449144 kernel: audit: type=1400 audit(1747442420.405:583): avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.405000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.459139 kernel: audit: type=1300 audit(1747442420.405:583): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00395e000 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.405000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00395e000 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.475045 kernel: audit: type=1327 audit(1747442420.405:583): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.475208 kernel: audit: type=1400 audit(1747442420.416:584): avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.416000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.416000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0038ec5a0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.416000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.434000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.434000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0024ff3a0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.434000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.434000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.434000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0073995f0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:40:20.434000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:40:20.692771 kubelet[2264]: I0517 00:40:20.692641 2264 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-25-158" May 17 00:40:20.692971 kubelet[2264]: E0517 00:40:20.692952 2264 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ip-172-31-25-158\": node \"ip-172-31-25-158\" not found" May 17 00:40:20.717523 kubelet[2264]: E0517 00:40:20.717478 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:20.818259 kubelet[2264]: E0517 00:40:20.818018 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:20.919020 kubelet[2264]: E0517 00:40:20.918954 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.019951 kubelet[2264]: E0517 00:40:21.019831 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.120365 kubelet[2264]: E0517 00:40:21.120311 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.221283 kubelet[2264]: E0517 00:40:21.221230 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.322824 kubelet[2264]: E0517 00:40:21.322778 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.423865 kubelet[2264]: E0517 00:40:21.423833 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.524759 kubelet[2264]: E0517 00:40:21.524702 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.624896 kubelet[2264]: E0517 00:40:21.624786 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.725772 kubelet[2264]: E0517 00:40:21.725718 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.826461 kubelet[2264]: E0517 00:40:21.826421 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:21.927508 kubelet[2264]: E0517 00:40:21.927369 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.028004 kubelet[2264]: E0517 00:40:22.027799 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.130694 kubelet[2264]: E0517 00:40:22.129757 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.229990 kubelet[2264]: E0517 00:40:22.229890 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.330471 kubelet[2264]: E0517 00:40:22.330418 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.431346 kubelet[2264]: E0517 00:40:22.431316 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.532309 kubelet[2264]: E0517 00:40:22.532267 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.632923 kubelet[2264]: E0517 00:40:22.632849 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.733074 kubelet[2264]: E0517 00:40:22.733033 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.784579 systemd[1]: Reloading. May 17 00:40:22.833547 kubelet[2264]: E0517 00:40:22.833490 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.894216 /usr/lib/systemd/system-generators/torcx-generator[2555]: time="2025-05-17T00:40:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:40:22.894727 /usr/lib/systemd/system-generators/torcx-generator[2555]: time="2025-05-17T00:40:22Z" level=info msg="torcx already run" May 17 00:40:22.934471 kubelet[2264]: E0517 00:40:22.934431 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:22.983440 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:40:22.983465 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:40:23.004615 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:40:23.035554 kubelet[2264]: E0517 00:40:23.035451 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.098000 audit: BPF prog-id=88 op=LOAD May 17 00:40:23.098000 audit: BPF prog-id=46 op=UNLOAD May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit: BPF prog-id=89 op=LOAD May 17 00:40:23.099000 audit: BPF prog-id=84 op=UNLOAD May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.100000 audit: BPF prog-id=90 op=LOAD May 17 00:40:23.100000 audit: BPF prog-id=47 op=UNLOAD May 17 00:40:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.102000 audit: BPF prog-id=91 op=LOAD May 17 00:40:23.102000 audit: BPF prog-id=80 op=UNLOAD May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit: BPF prog-id=92 op=LOAD May 17 00:40:23.104000 audit: BPF prog-id=48 op=UNLOAD May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit: BPF prog-id=93 op=LOAD May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit: BPF prog-id=94 op=LOAD May 17 00:40:23.105000 audit: BPF prog-id=49 op=UNLOAD May 17 00:40:23.105000 audit: BPF prog-id=50 op=UNLOAD May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit: BPF prog-id=95 op=LOAD May 17 00:40:23.106000 audit: BPF prog-id=51 op=UNLOAD May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit: BPF prog-id=96 op=LOAD May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.106000 audit: BPF prog-id=97 op=LOAD May 17 00:40:23.106000 audit: BPF prog-id=52 op=UNLOAD May 17 00:40:23.106000 audit: BPF prog-id=53 op=UNLOAD May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit: BPF prog-id=98 op=LOAD May 17 00:40:23.108000 audit: BPF prog-id=64 op=UNLOAD May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.109000 audit: BPF prog-id=99 op=LOAD May 17 00:40:23.109000 audit: BPF prog-id=72 op=UNLOAD May 17 00:40:23.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.111000 audit: BPF prog-id=100 op=LOAD May 17 00:40:23.111000 audit: BPF prog-id=68 op=UNLOAD May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit: BPF prog-id=101 op=LOAD May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.114000 audit: BPF prog-id=102 op=LOAD May 17 00:40:23.114000 audit: BPF prog-id=54 op=UNLOAD May 17 00:40:23.114000 audit: BPF prog-id=55 op=UNLOAD May 17 00:40:23.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.115000 audit: BPF prog-id=103 op=LOAD May 17 00:40:23.116000 audit: BPF prog-id=59 op=UNLOAD May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit: BPF prog-id=104 op=LOAD May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit: BPF prog-id=105 op=LOAD May 17 00:40:23.116000 audit: BPF prog-id=60 op=UNLOAD May 17 00:40:23.116000 audit: BPF prog-id=61 op=UNLOAD May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.117000 audit: BPF prog-id=106 op=LOAD May 17 00:40:23.117000 audit: BPF prog-id=62 op=UNLOAD May 17 00:40:23.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.118000 audit: BPF prog-id=107 op=LOAD May 17 00:40:23.118000 audit: BPF prog-id=76 op=UNLOAD May 17 00:40:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:23.120000 audit: BPF prog-id=108 op=LOAD May 17 00:40:23.120000 audit: BPF prog-id=63 op=UNLOAD May 17 00:40:23.136783 kubelet[2264]: E0517 00:40:23.136734 2264 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:23.137878 systemd[1]: Stopping kubelet.service... May 17 00:40:23.154772 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:40:23.155185 systemd[1]: Stopped kubelet.service. May 17 00:40:23.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:23.155266 systemd[1]: kubelet.service: Consumed 1.125s CPU time. May 17 00:40:23.157972 systemd[1]: Starting kubelet.service... May 17 00:40:24.473925 amazon-ssm-agent[1784]: 2025-05-17 00:40:24 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 17 00:40:24.560173 systemd[1]: Started kubelet.service. May 17 00:40:24.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:24.678282 kubelet[2612]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:40:24.678819 kubelet[2612]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:40:24.678898 kubelet[2612]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:40:24.679160 kubelet[2612]: I0517 00:40:24.679100 2612 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:40:24.713643 kubelet[2612]: I0517 00:40:24.712828 2612 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:40:24.713643 kubelet[2612]: I0517 00:40:24.712879 2612 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:40:24.713643 kubelet[2612]: I0517 00:40:24.713275 2612 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:40:24.731462 kubelet[2612]: I0517 00:40:24.730441 2612 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:40:24.764939 kubelet[2612]: I0517 00:40:24.764903 2612 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:40:24.785383 kubelet[2612]: E0517 00:40:24.785344 2612 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:40:24.785383 kubelet[2612]: I0517 00:40:24.785379 2612 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:40:24.788911 kubelet[2612]: I0517 00:40:24.788879 2612 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:40:24.789231 kubelet[2612]: I0517 00:40:24.789184 2612 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:40:24.789444 kubelet[2612]: I0517 00:40:24.789222 2612 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-25-158","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:40:24.789609 kubelet[2612]: I0517 00:40:24.789454 2612 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:40:24.789609 kubelet[2612]: I0517 00:40:24.789468 2612 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:40:24.789609 kubelet[2612]: I0517 00:40:24.789531 2612 state_mem.go:36] "Initialized new in-memory state store" May 17 00:40:24.817182 kubelet[2612]: I0517 00:40:24.817146 2612 kubelet.go:446] "Attempting to sync node with API server" May 17 00:40:24.817182 kubelet[2612]: I0517 00:40:24.817186 2612 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:40:24.817413 kubelet[2612]: I0517 00:40:24.817228 2612 kubelet.go:352] "Adding apiserver pod source" May 17 00:40:24.817413 kubelet[2612]: I0517 00:40:24.817241 2612 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:40:24.826677 kubelet[2612]: I0517 00:40:24.821603 2612 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:40:24.826677 kubelet[2612]: I0517 00:40:24.822057 2612 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:40:24.826677 kubelet[2612]: I0517 00:40:24.822576 2612 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:40:24.826677 kubelet[2612]: I0517 00:40:24.822605 2612 server.go:1287] "Started kubelet" May 17 00:40:24.865000 audit[2612]: AVC avc: denied { mac_admin } for pid=2612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:24.865000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:24.865000 audit[2612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000753320 a1=c00090b6e0 a2=c0007532f0 a3=25 items=0 ppid=1 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:24.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:24.865000 audit[2612]: AVC avc: denied { mac_admin } for pid=2612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:24.865000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:24.865000 audit[2612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008e7f60 a1=c00090b6f8 a2=c0007533b0 a3=25 items=0 ppid=1 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:24.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:24.867968 kubelet[2612]: I0517 00:40:24.866728 2612 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:40:24.867968 kubelet[2612]: I0517 00:40:24.866802 2612 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:40:24.867968 kubelet[2612]: I0517 00:40:24.866849 2612 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:40:24.875169 kubelet[2612]: I0517 00:40:24.875100 2612 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:40:24.876347 kubelet[2612]: I0517 00:40:24.876317 2612 server.go:479] "Adding debug handlers to kubelet server" May 17 00:40:24.877849 kubelet[2612]: I0517 00:40:24.877398 2612 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:40:24.877849 kubelet[2612]: I0517 00:40:24.877621 2612 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:40:24.878029 kubelet[2612]: I0517 00:40:24.877865 2612 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:40:24.880060 kubelet[2612]: I0517 00:40:24.880031 2612 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:40:24.880954 kubelet[2612]: E0517 00:40:24.880367 2612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-25-158\" not found" May 17 00:40:24.884290 kubelet[2612]: I0517 00:40:24.884264 2612 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:40:24.884413 kubelet[2612]: I0517 00:40:24.884399 2612 reconciler.go:26] "Reconciler: start to sync state" May 17 00:40:24.888473 kubelet[2612]: I0517 00:40:24.887206 2612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:40:24.890525 kubelet[2612]: I0517 00:40:24.889833 2612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:40:24.890525 kubelet[2612]: I0517 00:40:24.889877 2612 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:40:24.890525 kubelet[2612]: I0517 00:40:24.889901 2612 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:40:24.890525 kubelet[2612]: I0517 00:40:24.889909 2612 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:40:24.890525 kubelet[2612]: E0517 00:40:24.889971 2612 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:40:24.908790 kubelet[2612]: I0517 00:40:24.907294 2612 factory.go:221] Registration of the systemd container factory successfully May 17 00:40:24.908790 kubelet[2612]: I0517 00:40:24.907404 2612 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:40:24.910701 kubelet[2612]: I0517 00:40:24.909843 2612 factory.go:221] Registration of the containerd container factory successfully May 17 00:40:24.926689 kubelet[2612]: E0517 00:40:24.926650 2612 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:40:24.983159 kubelet[2612]: I0517 00:40:24.983062 2612 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:40:24.983319 kubelet[2612]: I0517 00:40:24.983304 2612 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:40:24.983570 kubelet[2612]: I0517 00:40:24.983559 2612 state_mem.go:36] "Initialized new in-memory state store" May 17 00:40:24.984016 kubelet[2612]: I0517 00:40:24.983996 2612 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:40:24.984220 kubelet[2612]: I0517 00:40:24.984157 2612 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:40:24.984340 kubelet[2612]: I0517 00:40:24.984331 2612 policy_none.go:49] "None policy: Start" May 17 00:40:24.984454 kubelet[2612]: I0517 00:40:24.984444 2612 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:40:24.984573 kubelet[2612]: I0517 00:40:24.984564 2612 state_mem.go:35] "Initializing new in-memory state store" May 17 00:40:24.984912 kubelet[2612]: I0517 00:40:24.984901 2612 state_mem.go:75] "Updated machine memory state" May 17 00:40:24.990308 kubelet[2612]: E0517 00:40:24.990281 2612 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:40:24.990458 kubelet[2612]: I0517 00:40:24.990409 2612 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:40:24.989000 audit[2612]: AVC avc: denied { mac_admin } for pid=2612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:24.989000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:24.989000 audit[2612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009bcff0 a1=c000863758 a2=c0009bcfc0 a3=25 items=0 ppid=1 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:24.989000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:24.991333 kubelet[2612]: I0517 00:40:24.991310 2612 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:40:24.991900 kubelet[2612]: I0517 00:40:24.991886 2612 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:40:24.992107 kubelet[2612]: I0517 00:40:24.992058 2612 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:40:24.993224 kubelet[2612]: I0517 00:40:24.993208 2612 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:40:24.996717 kubelet[2612]: E0517 00:40:24.996688 2612 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:40:25.104266 kubelet[2612]: I0517 00:40:25.104228 2612 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-25-158" May 17 00:40:25.115083 kubelet[2612]: I0517 00:40:25.115045 2612 kubelet_node_status.go:124] "Node was previously registered" node="ip-172-31-25-158" May 17 00:40:25.115276 kubelet[2612]: I0517 00:40:25.115150 2612 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-25-158" May 17 00:40:25.191955 kubelet[2612]: I0517 00:40:25.191917 2612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:25.195897 kubelet[2612]: I0517 00:40:25.195866 2612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-25-158" May 17 00:40:25.197816 kubelet[2612]: I0517 00:40:25.196172 2612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:25.288189 kubelet[2612]: I0517 00:40:25.288127 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e1d679cdaaff4d088c8fb7ecb63ac331-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-158\" (UID: \"e1d679cdaaff4d088c8fb7ecb63ac331\") " pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:25.288189 kubelet[2612]: I0517 00:40:25.288168 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e1d679cdaaff4d088c8fb7ecb63ac331-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-158\" (UID: \"e1d679cdaaff4d088c8fb7ecb63ac331\") " pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:25.288189 kubelet[2612]: I0517 00:40:25.288191 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:25.288425 kubelet[2612]: I0517 00:40:25.288209 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:25.288425 kubelet[2612]: I0517 00:40:25.288230 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e1d679cdaaff4d088c8fb7ecb63ac331-ca-certs\") pod \"kube-apiserver-ip-172-31-25-158\" (UID: \"e1d679cdaaff4d088c8fb7ecb63ac331\") " pod="kube-system/kube-apiserver-ip-172-31-25-158" May 17 00:40:25.288425 kubelet[2612]: I0517 00:40:25.288263 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:25.288425 kubelet[2612]: I0517 00:40:25.288284 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:25.288425 kubelet[2612]: I0517 00:40:25.288302 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/70fa76da26a8adca76b10df8fd3eea3d-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-158\" (UID: \"70fa76da26a8adca76b10df8fd3eea3d\") " pod="kube-system/kube-controller-manager-ip-172-31-25-158" May 17 00:40:25.288570 kubelet[2612]: I0517 00:40:25.288318 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c789ad07624521905346189b10ac8f9f-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-158\" (UID: \"c789ad07624521905346189b10ac8f9f\") " pod="kube-system/kube-scheduler-ip-172-31-25-158" May 17 00:40:25.819994 kubelet[2612]: I0517 00:40:25.819968 2612 apiserver.go:52] "Watching apiserver" May 17 00:40:25.885062 kubelet[2612]: I0517 00:40:25.885010 2612 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:40:25.963416 kubelet[2612]: I0517 00:40:25.963391 2612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-25-158" May 17 00:40:25.984222 kubelet[2612]: E0517 00:40:25.984195 2612 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-25-158\" already exists" pod="kube-system/kube-scheduler-ip-172-31-25-158" May 17 00:40:26.015241 kubelet[2612]: I0517 00:40:26.015162 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-25-158" podStartSLOduration=1.015141049 podStartE2EDuration="1.015141049s" podCreationTimestamp="2025-05-17 00:40:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:40:26.000146546 +0000 UTC m=+1.422451422" watchObservedRunningTime="2025-05-17 00:40:26.015141049 +0000 UTC m=+1.437445923" May 17 00:40:26.036907 kubelet[2612]: I0517 00:40:26.036863 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-25-158" podStartSLOduration=1.036830248 podStartE2EDuration="1.036830248s" podCreationTimestamp="2025-05-17 00:40:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:40:26.015963054 +0000 UTC m=+1.438267924" watchObservedRunningTime="2025-05-17 00:40:26.036830248 +0000 UTC m=+1.459135102" May 17 00:40:26.055649 kubelet[2612]: I0517 00:40:26.055590 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-25-158" podStartSLOduration=1.055566131 podStartE2EDuration="1.055566131s" podCreationTimestamp="2025-05-17 00:40:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:40:26.037810346 +0000 UTC m=+1.460115230" watchObservedRunningTime="2025-05-17 00:40:26.055566131 +0000 UTC m=+1.477871002" May 17 00:40:27.325000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:40:27.326974 kernel: kauditd_printk_skb: 266 callbacks suppressed May 17 00:40:27.327101 kernel: audit: type=1400 audit(1747442427.325:836): avc: denied { watch } for pid=2468 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:40:27.325000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e7a540 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.343467 kernel: audit: type=1300 audit(1747442427.325:836): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e7a540 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.343613 kernel: audit: type=1327 audit(1747442427.325:836): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.665000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.672215 kernel: audit: type=1400 audit(1747442427.665:837): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.665000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000079720 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.665000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.688176 kernel: audit: type=1300 audit(1747442427.665:837): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000079720 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.688324 kernel: audit: type=1327 audit(1747442427.665:837): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.665000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.689163 kernel: audit: type=1400 audit(1747442427.665:838): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.665000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0000799c0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.695207 kernel: audit: type=1300 audit(1747442427.665:838): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0000799c0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.665000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.710174 kernel: audit: type=1327 audit(1747442427.665:838): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.665000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.665000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd9f60 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.718241 kernel: audit: type=1400 audit(1747442427.665:839): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.665000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:27.665000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:27.665000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd9fa0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:40:27.665000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:28.849066 kubelet[2612]: I0517 00:40:28.849040 2612 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:40:28.849894 env[1739]: time="2025-05-17T00:40:28.849841398Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:40:28.850418 kubelet[2612]: I0517 00:40:28.850171 2612 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:40:29.547052 systemd[1]: Created slice kubepods-besteffort-podb7e86c95_e65d_4652_b996_346c9a35ea46.slice. May 17 00:40:29.614259 kubelet[2612]: I0517 00:40:29.614163 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b7e86c95-e65d-4652-b996-346c9a35ea46-kube-proxy\") pod \"kube-proxy-t5kzx\" (UID: \"b7e86c95-e65d-4652-b996-346c9a35ea46\") " pod="kube-system/kube-proxy-t5kzx" May 17 00:40:29.614259 kubelet[2612]: I0517 00:40:29.614221 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b7e86c95-e65d-4652-b996-346c9a35ea46-xtables-lock\") pod \"kube-proxy-t5kzx\" (UID: \"b7e86c95-e65d-4652-b996-346c9a35ea46\") " pod="kube-system/kube-proxy-t5kzx" May 17 00:40:29.614259 kubelet[2612]: I0517 00:40:29.614245 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b7e86c95-e65d-4652-b996-346c9a35ea46-lib-modules\") pod \"kube-proxy-t5kzx\" (UID: \"b7e86c95-e65d-4652-b996-346c9a35ea46\") " pod="kube-system/kube-proxy-t5kzx" May 17 00:40:29.614515 kubelet[2612]: I0517 00:40:29.614270 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xx2sp\" (UniqueName: \"kubernetes.io/projected/b7e86c95-e65d-4652-b996-346c9a35ea46-kube-api-access-xx2sp\") pod \"kube-proxy-t5kzx\" (UID: \"b7e86c95-e65d-4652-b996-346c9a35ea46\") " pod="kube-system/kube-proxy-t5kzx" May 17 00:40:29.721835 kubelet[2612]: I0517 00:40:29.721800 2612 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:40:29.855535 env[1739]: time="2025-05-17T00:40:29.855417581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t5kzx,Uid:b7e86c95-e65d-4652-b996-346c9a35ea46,Namespace:kube-system,Attempt:0,}" May 17 00:40:29.867739 systemd[1]: Created slice kubepods-besteffort-podc07d7f7a_bdc8_44be_bdad_fada51419b38.slice. May 17 00:40:29.897191 env[1739]: time="2025-05-17T00:40:29.897089529Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:29.897191 env[1739]: time="2025-05-17T00:40:29.897162504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:29.897535 env[1739]: time="2025-05-17T00:40:29.897179189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:29.897647 env[1739]: time="2025-05-17T00:40:29.897588215Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78247b898676d7ea76af59db704c6a10099358f2d047e2ef40ad64b33994effe pid=2659 runtime=io.containerd.runc.v2 May 17 00:40:29.917930 kubelet[2612]: I0517 00:40:29.915639 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b9h7v\" (UniqueName: \"kubernetes.io/projected/c07d7f7a-bdc8-44be-bdad-fada51419b38-kube-api-access-b9h7v\") pod \"tigera-operator-844669ff44-62bns\" (UID: \"c07d7f7a-bdc8-44be-bdad-fada51419b38\") " pod="tigera-operator/tigera-operator-844669ff44-62bns" May 17 00:40:29.917930 kubelet[2612]: I0517 00:40:29.915715 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c07d7f7a-bdc8-44be-bdad-fada51419b38-var-lib-calico\") pod \"tigera-operator-844669ff44-62bns\" (UID: \"c07d7f7a-bdc8-44be-bdad-fada51419b38\") " pod="tigera-operator/tigera-operator-844669ff44-62bns" May 17 00:40:29.937661 systemd[1]: Started cri-containerd-78247b898676d7ea76af59db704c6a10099358f2d047e2ef40ad64b33994effe.scope. May 17 00:40:29.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit: BPF prog-id=109 op=LOAD May 17 00:40:29.950000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.950000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2659 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:29.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323437623839383637366437656137366166353964623730346336 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2659 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:29.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323437623839383637366437656137366166353964623730346336 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit: BPF prog-id=110 op=LOAD May 17 00:40:29.951000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e5f10 items=0 ppid=2659 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:29.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323437623839383637366437656137366166353964623730346336 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit: BPF prog-id=111 op=LOAD May 17 00:40:29.951000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e5f58 items=0 ppid=2659 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:29.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323437623839383637366437656137366166353964623730346336 May 17 00:40:29.951000 audit: BPF prog-id=111 op=UNLOAD May 17 00:40:29.951000 audit: BPF prog-id=110 op=UNLOAD May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:29.951000 audit: BPF prog-id=112 op=LOAD May 17 00:40:29.951000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034a368 items=0 ppid=2659 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:29.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738323437623839383637366437656137366166353964623730346336 May 17 00:40:29.965629 env[1739]: time="2025-05-17T00:40:29.965414275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t5kzx,Uid:b7e86c95-e65d-4652-b996-346c9a35ea46,Namespace:kube-system,Attempt:0,} returns sandbox id \"78247b898676d7ea76af59db704c6a10099358f2d047e2ef40ad64b33994effe\"" May 17 00:40:29.969816 env[1739]: time="2025-05-17T00:40:29.969771774Z" level=info msg="CreateContainer within sandbox \"78247b898676d7ea76af59db704c6a10099358f2d047e2ef40ad64b33994effe\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:40:30.011525 env[1739]: time="2025-05-17T00:40:30.011452419Z" level=info msg="CreateContainer within sandbox \"78247b898676d7ea76af59db704c6a10099358f2d047e2ef40ad64b33994effe\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bd16c0a8cf46495e50f6e9ea3bd32d58cdc970d8802543d060f0a8c74bcbcee5\"" May 17 00:40:30.012857 env[1739]: time="2025-05-17T00:40:30.012820270Z" level=info msg="StartContainer for \"bd16c0a8cf46495e50f6e9ea3bd32d58cdc970d8802543d060f0a8c74bcbcee5\"" May 17 00:40:30.043903 systemd[1]: Started cri-containerd-bd16c0a8cf46495e50f6e9ea3bd32d58cdc970d8802543d060f0a8c74bcbcee5.scope. May 17 00:40:30.067000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fecdbc6a2f8 items=0 ppid=2659 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313663306138636634363439356535306636653965613362643332 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.067000 audit: BPF prog-id=113 op=LOAD May 17 00:40:30.067000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024b28 items=0 ppid=2659 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313663306138636634363439356535306636653965613362643332 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit: BPF prog-id=114 op=LOAD May 17 00:40:30.068000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024b78 items=0 ppid=2659 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313663306138636634363439356535306636653965613362643332 May 17 00:40:30.068000 audit: BPF prog-id=114 op=UNLOAD May 17 00:40:30.068000 audit: BPF prog-id=113 op=UNLOAD May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.068000 audit: BPF prog-id=115 op=LOAD May 17 00:40:30.068000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024c08 items=0 ppid=2659 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264313663306138636634363439356535306636653965613362643332 May 17 00:40:30.086559 env[1739]: time="2025-05-17T00:40:30.086489054Z" level=info msg="StartContainer for \"bd16c0a8cf46495e50f6e9ea3bd32d58cdc970d8802543d060f0a8c74bcbcee5\" returns successfully" May 17 00:40:30.177033 env[1739]: time="2025-05-17T00:40:30.173874774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-62bns,Uid:c07d7f7a-bdc8-44be-bdad-fada51419b38,Namespace:tigera-operator,Attempt:0,}" May 17 00:40:30.199844 env[1739]: time="2025-05-17T00:40:30.199065062Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:30.199844 env[1739]: time="2025-05-17T00:40:30.199095471Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:30.199844 env[1739]: time="2025-05-17T00:40:30.199105769Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:30.199844 env[1739]: time="2025-05-17T00:40:30.199240804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4 pid=2737 runtime=io.containerd.runc.v2 May 17 00:40:30.221570 systemd[1]: Started cri-containerd-403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4.scope. May 17 00:40:30.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.239000 audit: BPF prog-id=116 op=LOAD May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2737 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336566646531653235613562626264366365326431653137353332 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2737 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336566646531653235613562626264366365326431653137353332 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit: BPF prog-id=117 op=LOAD May 17 00:40:30.240000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000263a20 items=0 ppid=2737 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336566646531653235613562626264366365326431653137353332 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit: BPF prog-id=118 op=LOAD May 17 00:40:30.240000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000263a68 items=0 ppid=2737 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336566646531653235613562626264366365326431653137353332 May 17 00:40:30.240000 audit: BPF prog-id=118 op=UNLOAD May 17 00:40:30.240000 audit: BPF prog-id=117 op=UNLOAD May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:30.240000 audit: BPF prog-id=119 op=LOAD May 17 00:40:30.240000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000263e78 items=0 ppid=2737 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336566646531653235613562626264366365326431653137353332 May 17 00:40:30.272579 env[1739]: time="2025-05-17T00:40:30.272535116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-62bns,Uid:c07d7f7a-bdc8-44be-bdad-fada51419b38,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4\"" May 17 00:40:30.274766 env[1739]: time="2025-05-17T00:40:30.274729756Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:40:30.745832 systemd[1]: run-containerd-runc-k8s.io-78247b898676d7ea76af59db704c6a10099358f2d047e2ef40ad64b33994effe-runc.2FReFI.mount: Deactivated successfully. May 17 00:40:30.747000 audit[2807]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.747000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8f1a19d0 a2=0 a3=7ffc8f1a19bc items=0 ppid=2715 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:40:30.749000 audit[2808]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.749000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcac4a7030 a2=0 a3=7ffcac4a701c items=0 ppid=2715 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:40:30.753000 audit[2809]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.753000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3d53bfc0 a2=0 a3=7fff3d53bfac items=0 ppid=2715 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:40:30.754000 audit[2810]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:30.754000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb97112f0 a2=0 a3=7fffb97112dc items=0 ppid=2715 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:40:30.756000 audit[2811]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:30.756000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd63f21550 a2=0 a3=7ffd63f2153c items=0 ppid=2715 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:40:30.758000 audit[2812]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:30.758000 audit[2812]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffec9ff110 a2=0 a3=7fffec9ff0fc items=0 ppid=2715 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:40:30.860000 audit[2813]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.860000 audit[2813]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdb213aed0 a2=0 a3=7ffdb213aebc items=0 ppid=2715 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:40:30.866000 audit[2815]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2815 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.866000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7e71c330 a2=0 a3=7ffd7e71c31c items=0 ppid=2715 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:40:30.871000 audit[2818]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.871000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc681df4f0 a2=0 a3=7ffc681df4dc items=0 ppid=2715 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:40:30.873000 audit[2819]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.873000 audit[2819]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccd994f00 a2=0 a3=7ffccd994eec items=0 ppid=2715 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:40:30.876000 audit[2821]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.876000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff53ea9a80 a2=0 a3=7fff53ea9a6c items=0 ppid=2715 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:40:30.878000 audit[2822]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.878000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe99bafa00 a2=0 a3=7ffe99baf9ec items=0 ppid=2715 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:40:30.881875 update_engine[1732]: I0517 00:40:30.881184 1732 update_attempter.cc:509] Updating boot flags... May 17 00:40:30.882000 audit[2824]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.882000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5fa17650 a2=0 a3=7ffd5fa1763c items=0 ppid=2715 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:40:30.887000 audit[2828]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.887000 audit[2828]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff063eb160 a2=0 a3=7fff063eb14c items=0 ppid=2715 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:40:30.890000 audit[2829]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.890000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd905a1c0 a2=0 a3=7ffdd905a1ac items=0 ppid=2715 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:40:30.897000 audit[2833]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.897000 audit[2833]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda21d1d60 a2=0 a3=7ffda21d1d4c items=0 ppid=2715 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:40:30.900000 audit[2834]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.900000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc7cb2de0 a2=0 a3=7ffdc7cb2dcc items=0 ppid=2715 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:40:30.910000 audit[2838]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.910000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9384b120 a2=0 a3=7ffd9384b10c items=0 ppid=2715 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:40:30.916000 audit[2842]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.916000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe62be0b0 a2=0 a3=7fffe62be09c items=0 ppid=2715 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:40:30.923000 audit[2845]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2845 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.923000 audit[2845]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf52d1550 a2=0 a3=7ffdf52d153c items=0 ppid=2715 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:40:30.926000 audit[2846]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.926000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd2853f40 a2=0 a3=7ffdd2853f2c items=0 ppid=2715 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:40:30.931000 audit[2848]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.931000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd8c4340e0 a2=0 a3=7ffd8c4340cc items=0 ppid=2715 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:40:30.937000 audit[2852]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.937000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca6743d40 a2=0 a3=7ffca6743d2c items=0 ppid=2715 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:40:30.938000 audit[2853]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.938000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9f790ff0 a2=0 a3=7ffd9f790fdc items=0 ppid=2715 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:40:30.943000 audit[2860]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2860 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:30.943000 audit[2860]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdca56b4b0 a2=0 a3=7ffdca56b49c items=0 ppid=2715 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:40:31.011268 kubelet[2612]: I0517 00:40:30.997866 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-t5kzx" podStartSLOduration=1.997846888 podStartE2EDuration="1.997846888s" podCreationTimestamp="2025-05-17 00:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:40:30.997605915 +0000 UTC m=+6.419910789" watchObservedRunningTime="2025-05-17 00:40:30.997846888 +0000 UTC m=+6.420151760" May 17 00:40:31.042000 audit[2871]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.042000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff17b3dc60 a2=0 a3=7fff17b3dc4c items=0 ppid=2715 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.061000 audit[2871]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.061000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff17b3dc60 a2=0 a3=7fff17b3dc4c items=0 ppid=2715 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.082000 audit[2926]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.082000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd187ca4b0 a2=0 a3=7ffd187ca49c items=0 ppid=2715 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:40:31.101000 audit[2944]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.101000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff0f7a0c60 a2=0 a3=7fff0f7a0c4c items=0 ppid=2715 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:40:31.132000 audit[2961]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.132000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffaeccf8e0 a2=0 a3=7fffaeccf8cc items=0 ppid=2715 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:40:31.146000 audit[2963]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.146000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdb155de0 a2=0 a3=7fffdb155dcc items=0 ppid=2715 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:40:31.155000 audit[2965]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.155000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2b9123d0 a2=0 a3=7ffc2b9123bc items=0 ppid=2715 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:40:31.157000 audit[2966]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.157000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe890eabf0 a2=0 a3=7ffe890eabdc items=0 ppid=2715 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:40:31.162000 audit[2968]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.162000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd40667020 a2=0 a3=7ffd4066700c items=0 ppid=2715 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:40:31.168000 audit[2971]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.168000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc36262ff0 a2=0 a3=7ffc36262fdc items=0 ppid=2715 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:40:31.170000 audit[2972]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.170000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff796cafa0 a2=0 a3=7fff796caf8c items=0 ppid=2715 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:40:31.174000 audit[2974]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.174000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd994f570 a2=0 a3=7ffdd994f55c items=0 ppid=2715 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:40:31.176000 audit[2975]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.176000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcefe48350 a2=0 a3=7ffcefe4833c items=0 ppid=2715 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:40:31.181000 audit[2977]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.181000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb8835410 a2=0 a3=7ffdb88353fc items=0 ppid=2715 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:40:31.193000 audit[2981]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.193000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe13bcead0 a2=0 a3=7ffe13bceabc items=0 ppid=2715 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:40:31.201000 audit[2984]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.201000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdcb27150 a2=0 a3=7fffdcb2713c items=0 ppid=2715 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:40:31.203000 audit[2985]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.203000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea6296630 a2=0 a3=7ffea629661c items=0 ppid=2715 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:40:31.215000 audit[2988]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.215000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc878c9fc0 a2=0 a3=7ffc878c9fac items=0 ppid=2715 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:40:31.231000 audit[2996]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.231000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff217f9a70 a2=0 a3=7fff217f9a5c items=0 ppid=2715 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:40:31.233000 audit[2997]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.233000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd329382e0 a2=0 a3=7ffd329382cc items=0 ppid=2715 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:40:31.242000 audit[3000]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.242000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffeac79a850 a2=0 a3=7ffeac79a83c items=0 ppid=2715 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:40:31.248000 audit[3002]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.248000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb3448670 a2=0 a3=7ffcb344865c items=0 ppid=2715 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:40:31.255000 audit[3009]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.255000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcffeafdc0 a2=0 a3=7ffcffeafdac items=0 ppid=2715 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:40:31.267000 audit[3020]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3020 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:40:31.267000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffecf431640 a2=0 a3=7ffecf43162c items=0 ppid=2715 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:40:31.276000 audit[3029]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:40:31.276000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe260fa620 a2=0 a3=7ffe260fa60c items=0 ppid=2715 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.276000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.276000 audit[3029]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:40:31.276000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe260fa620 a2=0 a3=7ffe260fa60c items=0 ppid=2715 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.276000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:32.027333 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2632863454.mount: Deactivated successfully. May 17 00:40:32.915521 env[1739]: time="2025-05-17T00:40:32.915470516Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:32.917743 env[1739]: time="2025-05-17T00:40:32.917709733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:32.919925 env[1739]: time="2025-05-17T00:40:32.919887275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:32.922397 env[1739]: time="2025-05-17T00:40:32.922351107Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:32.922845 env[1739]: time="2025-05-17T00:40:32.922811776Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:40:32.925228 env[1739]: time="2025-05-17T00:40:32.925200683Z" level=info msg="CreateContainer within sandbox \"403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:40:32.952288 env[1739]: time="2025-05-17T00:40:32.952225104Z" level=info msg="CreateContainer within sandbox \"403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963\"" May 17 00:40:32.954333 env[1739]: time="2025-05-17T00:40:32.953164211Z" level=info msg="StartContainer for \"3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963\"" May 17 00:40:32.978721 systemd[1]: Started cri-containerd-3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963.scope. May 17 00:40:33.014897 kernel: kauditd_printk_skb: 315 callbacks suppressed May 17 00:40:33.015063 kernel: audit: type=1400 audit(1747442433.006:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.015106 kernel: audit: type=1400 audit(1747442433.006:935): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026846 kernel: audit: type=1400 audit(1747442433.006:936): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.039276 kernel: audit: type=1400 audit(1747442433.006:937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.039791 kernel: audit: type=1400 audit(1747442433.006:938): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.039841 kernel: audit: type=1400 audit(1747442433.006:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.052143 kernel: audit: type=1400 audit(1747442433.006:940): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.058275 kernel: audit: type=1400 audit(1747442433.006:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.072136 kernel: audit: type=1400 audit(1747442433.006:942): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.072276 kernel: audit: type=1400 audit(1747442433.021:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.021000 audit: BPF prog-id=120 op=LOAD May 17 00:40:33.025000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2737 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361636163316532383230313736386130626634633766306330393865 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2737 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361636163316532383230313736386130626634633766306330393865 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.025000 audit: BPF prog-id=121 op=LOAD May 17 00:40:33.025000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000291590 items=0 ppid=2737 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361636163316532383230313736386130626634633766306330393865 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit: BPF prog-id=122 op=LOAD May 17 00:40:33.026000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002915d8 items=0 ppid=2737 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361636163316532383230313736386130626634633766306330393865 May 17 00:40:33.026000 audit: BPF prog-id=122 op=UNLOAD May 17 00:40:33.026000 audit: BPF prog-id=121 op=UNLOAD May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.026000 audit: BPF prog-id=123 op=LOAD May 17 00:40:33.026000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002919e8 items=0 ppid=2737 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361636163316532383230313736386130626634633766306330393865 May 17 00:40:33.082788 env[1739]: time="2025-05-17T00:40:33.082727774Z" level=info msg="StartContainer for \"3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963\" returns successfully" May 17 00:40:34.026152 kubelet[2612]: I0517 00:40:34.025956 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-62bns" podStartSLOduration=2.375759141 podStartE2EDuration="5.025934514s" podCreationTimestamp="2025-05-17 00:40:29 +0000 UTC" firstStartedPulling="2025-05-17 00:40:30.273979886 +0000 UTC m=+5.696284750" lastFinishedPulling="2025-05-17 00:40:32.924155256 +0000 UTC m=+8.346460123" observedRunningTime="2025-05-17 00:40:34.012360916 +0000 UTC m=+9.434665787" watchObservedRunningTime="2025-05-17 00:40:34.025934514 +0000 UTC m=+9.448239382" May 17 00:40:40.198156 sudo[2010]: pam_unix(sudo:session): session closed for user root May 17 00:40:40.208149 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:40:40.208293 kernel: audit: type=1106 audit(1747442440.198:952): pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:40.198000 audit[2010]: USER_END pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:40.217134 kernel: audit: type=1104 audit(1747442440.198:953): pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:40.198000 audit[2010]: CRED_DISP pid=2010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:40.232398 sshd[2007]: pam_unix(sshd:session): session closed for user core May 17 00:40:40.237000 audit[2007]: USER_END pid=2007 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:40:40.244991 systemd[1]: sshd@6-172.31.25.158:22-139.178.68.195:52900.service: Deactivated successfully. May 17 00:40:40.245920 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:40:40.246088 systemd[1]: session-7.scope: Consumed 4.615s CPU time. May 17 00:40:40.247662 systemd-logind[1731]: Session 7 logged out. Waiting for processes to exit. May 17 00:40:40.248312 kernel: audit: type=1106 audit(1747442440.237:954): pid=2007 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:40:40.248940 systemd-logind[1731]: Removed session 7. May 17 00:40:40.238000 audit[2007]: CRED_DISP pid=2007 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:40:40.261140 kernel: audit: type=1104 audit(1747442440.238:955): pid=2007 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:40:40.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.158:22-139.178.68.195:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.275142 kernel: audit: type=1131 audit(1747442440.245:956): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.158:22-139.178.68.195:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.111000 audit[3259]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=3259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:41.111000 audit[3259]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe4bd7cd10 a2=0 a3=7ffe4bd7ccfc items=0 ppid=2715 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:41.126334 kernel: audit: type=1325 audit(1747442441.111:957): table=filter:89 family=2 entries=14 op=nft_register_rule pid=3259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:41.126487 kernel: audit: type=1300 audit(1747442441.111:957): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe4bd7cd10 a2=0 a3=7ffe4bd7ccfc items=0 ppid=2715 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:41.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:41.140142 kernel: audit: type=1327 audit(1747442441.111:957): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:41.130000 audit[3259]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:41.146153 kernel: audit: type=1325 audit(1747442441.130:958): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:41.130000 audit[3259]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe4bd7cd10 a2=0 a3=0 items=0 ppid=2715 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:41.158141 kernel: audit: type=1300 audit(1747442441.130:958): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe4bd7cd10 a2=0 a3=0 items=0 ppid=2715 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:41.130000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:41.152000 audit[3261]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=3261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:41.152000 audit[3261]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffcc2280e0 a2=0 a3=7fffcc2280cc items=0 ppid=2715 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:41.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:41.160000 audit[3261]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:41.160000 audit[3261]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffcc2280e0 a2=0 a3=0 items=0 ppid=2715 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:41.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:43.799000 audit[3264]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:43.799000 audit[3264]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdeb059680 a2=0 a3=7ffdeb05966c items=0 ppid=2715 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:43.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:43.804000 audit[3264]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:43.804000 audit[3264]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdeb059680 a2=0 a3=0 items=0 ppid=2715 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:43.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:43.818000 audit[3266]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:43.818000 audit[3266]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffadb04080 a2=0 a3=7fffadb0406c items=0 ppid=2715 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:43.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:43.825000 audit[3266]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:43.825000 audit[3266]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffadb04080 a2=0 a3=0 items=0 ppid=2715 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:43.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:44.316456 systemd[1]: Created slice kubepods-besteffort-pod8b565548_82be_4730_b872_98d732d7624f.slice. May 17 00:40:44.326671 kubelet[2612]: I0517 00:40:44.326625 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qjnwx\" (UniqueName: \"kubernetes.io/projected/8b565548-82be-4730-b872-98d732d7624f-kube-api-access-qjnwx\") pod \"calico-typha-6f969579d5-ss8s8\" (UID: \"8b565548-82be-4730-b872-98d732d7624f\") " pod="calico-system/calico-typha-6f969579d5-ss8s8" May 17 00:40:44.327252 kubelet[2612]: I0517 00:40:44.326681 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8b565548-82be-4730-b872-98d732d7624f-tigera-ca-bundle\") pod \"calico-typha-6f969579d5-ss8s8\" (UID: \"8b565548-82be-4730-b872-98d732d7624f\") " pod="calico-system/calico-typha-6f969579d5-ss8s8" May 17 00:40:44.327252 kubelet[2612]: I0517 00:40:44.326706 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8b565548-82be-4730-b872-98d732d7624f-typha-certs\") pod \"calico-typha-6f969579d5-ss8s8\" (UID: \"8b565548-82be-4730-b872-98d732d7624f\") " pod="calico-system/calico-typha-6f969579d5-ss8s8" May 17 00:40:44.620161 env[1739]: time="2025-05-17T00:40:44.620036832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f969579d5-ss8s8,Uid:8b565548-82be-4730-b872-98d732d7624f,Namespace:calico-system,Attempt:0,}" May 17 00:40:44.627423 systemd[1]: Created slice kubepods-besteffort-podd2d4e81f_5e36_4d81_ba28_8edbc2a72503.slice. May 17 00:40:44.656349 env[1739]: time="2025-05-17T00:40:44.651492565Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:44.656349 env[1739]: time="2025-05-17T00:40:44.651537014Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:44.656349 env[1739]: time="2025-05-17T00:40:44.651547691Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:44.656349 env[1739]: time="2025-05-17T00:40:44.651693703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ec6ca98caea1e3eeebd5ab12a2ee256bf583cf229b47edb96b8d096ba870329 pid=3276 runtime=io.containerd.runc.v2 May 17 00:40:44.673472 systemd[1]: Started cri-containerd-8ec6ca98caea1e3eeebd5ab12a2ee256bf583cf229b47edb96b8d096ba870329.scope. May 17 00:40:44.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.707000 audit: BPF prog-id=124 op=LOAD May 17 00:40:44.709000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.709000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000121c48 a2=10 a3=1c items=0 ppid=3276 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633663613938636165613165336565656264356162313261326565 May 17 00:40:44.709000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.709000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001216b0 a2=3c a3=c items=0 ppid=3276 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633663613938636165613165336565656264356162313261326565 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit: BPF prog-id=125 op=LOAD May 17 00:40:44.710000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001219d8 a2=78 a3=c000300360 items=0 ppid=3276 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633663613938636165613165336565656264356162313261326565 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.710000 audit: BPF prog-id=126 op=LOAD May 17 00:40:44.710000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000121770 a2=78 a3=c0003003a8 items=0 ppid=3276 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633663613938636165613165336565656264356162313261326565 May 17 00:40:44.711000 audit: BPF prog-id=126 op=UNLOAD May 17 00:40:44.711000 audit: BPF prog-id=125 op=UNLOAD May 17 00:40:44.711000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:44.711000 audit: BPF prog-id=127 op=LOAD May 17 00:40:44.711000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000121c30 a2=78 a3=c0003007b8 items=0 ppid=3276 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865633663613938636165613165336565656264356162313261326565 May 17 00:40:44.729640 kubelet[2612]: I0517 00:40:44.728969 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-policysync\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.729640 kubelet[2612]: I0517 00:40:44.729021 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-cni-log-dir\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.729640 kubelet[2612]: I0517 00:40:44.729050 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-cni-net-dir\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.729640 kubelet[2612]: I0517 00:40:44.729073 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-lib-modules\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.729640 kubelet[2612]: I0517 00:40:44.729103 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-cni-bin-dir\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730011 kubelet[2612]: I0517 00:40:44.729149 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-flexvol-driver-host\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730011 kubelet[2612]: I0517 00:40:44.729173 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-node-certs\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730011 kubelet[2612]: I0517 00:40:44.729199 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kgqmt\" (UniqueName: \"kubernetes.io/projected/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-kube-api-access-kgqmt\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730011 kubelet[2612]: I0517 00:40:44.729232 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-tigera-ca-bundle\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730011 kubelet[2612]: I0517 00:40:44.729275 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-var-lib-calico\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730249 kubelet[2612]: I0517 00:40:44.729303 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-var-run-calico\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.730249 kubelet[2612]: I0517 00:40:44.729326 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d2d4e81f-5e36-4d81-ba28-8edbc2a72503-xtables-lock\") pod \"calico-node-rmfqz\" (UID: \"d2d4e81f-5e36-4d81-ba28-8edbc2a72503\") " pod="calico-system/calico-node-rmfqz" May 17 00:40:44.751626 env[1739]: time="2025-05-17T00:40:44.751588449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f969579d5-ss8s8,Uid:8b565548-82be-4730-b872-98d732d7624f,Namespace:calico-system,Attempt:0,} returns sandbox id \"8ec6ca98caea1e3eeebd5ab12a2ee256bf583cf229b47edb96b8d096ba870329\"" May 17 00:40:44.753297 env[1739]: time="2025-05-17T00:40:44.753257171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:40:44.835589 kubelet[2612]: E0517 00:40:44.835557 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.835756 kubelet[2612]: W0517 00:40:44.835741 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.836688 kubelet[2612]: E0517 00:40:44.836668 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.843835 kubelet[2612]: E0517 00:40:44.843809 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.844020 kubelet[2612]: W0517 00:40:44.844002 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.844167 kubelet[2612]: E0517 00:40:44.844138 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.847000 audit[3314]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:44.847000 audit[3314]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffce3c76a80 a2=0 a3=7ffce3c76a6c items=0 ppid=2715 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:44.853000 audit[3314]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:44.853000 audit[3314]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffce3c76a80 a2=0 a3=0 items=0 ppid=2715 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:44.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:44.910389 kubelet[2612]: E0517 00:40:44.906823 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:44.930672 kubelet[2612]: E0517 00:40:44.930645 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.930862 kubelet[2612]: W0517 00:40:44.930845 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.930947 kubelet[2612]: E0517 00:40:44.930935 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.931249 kubelet[2612]: E0517 00:40:44.931235 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.931344 kubelet[2612]: W0517 00:40:44.931333 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.931409 kubelet[2612]: E0517 00:40:44.931390 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.931711 kubelet[2612]: E0517 00:40:44.931694 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.931790 kubelet[2612]: W0517 00:40:44.931781 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.931857 kubelet[2612]: E0517 00:40:44.931849 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.932200 kubelet[2612]: E0517 00:40:44.932189 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.932284 kubelet[2612]: W0517 00:40:44.932275 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.932341 kubelet[2612]: E0517 00:40:44.932326 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.932662 kubelet[2612]: E0517 00:40:44.932651 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.932751 kubelet[2612]: W0517 00:40:44.932742 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.932809 kubelet[2612]: E0517 00:40:44.932795 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.933241 kubelet[2612]: E0517 00:40:44.933230 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.933333 kubelet[2612]: W0517 00:40:44.933322 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.934002 kubelet[2612]: E0517 00:40:44.933987 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.935388 kubelet[2612]: E0517 00:40:44.935369 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.935486 kubelet[2612]: W0517 00:40:44.935475 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.935557 kubelet[2612]: E0517 00:40:44.935548 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.936254 kubelet[2612]: E0517 00:40:44.936243 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.936351 kubelet[2612]: W0517 00:40:44.936341 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.936420 kubelet[2612]: E0517 00:40:44.936412 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.936827 kubelet[2612]: E0517 00:40:44.936815 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.936914 kubelet[2612]: W0517 00:40:44.936902 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.936985 kubelet[2612]: E0517 00:40:44.936976 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.937057 kubelet[2612]: I0517 00:40:44.937047 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4732e8d0-52d1-4d24-aead-cc04fa7b437f-kubelet-dir\") pod \"csi-node-driver-q5bk6\" (UID: \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\") " pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:44.938017 env[1739]: time="2025-05-17T00:40:44.937688028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rmfqz,Uid:d2d4e81f-5e36-4d81-ba28-8edbc2a72503,Namespace:calico-system,Attempt:0,}" May 17 00:40:44.938398 kubelet[2612]: E0517 00:40:44.938376 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.938534 kubelet[2612]: W0517 00:40:44.938524 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.938612 kubelet[2612]: E0517 00:40:44.938600 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.938784 kubelet[2612]: I0517 00:40:44.938773 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4732e8d0-52d1-4d24-aead-cc04fa7b437f-registration-dir\") pod \"csi-node-driver-q5bk6\" (UID: \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\") " pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:44.939005 kubelet[2612]: E0517 00:40:44.938914 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.939087 kubelet[2612]: W0517 00:40:44.939078 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.939160 kubelet[2612]: E0517 00:40:44.939151 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.939632 kubelet[2612]: E0517 00:40:44.939620 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.939732 kubelet[2612]: W0517 00:40:44.939721 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.939800 kubelet[2612]: E0517 00:40:44.939791 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.940674 kubelet[2612]: E0517 00:40:44.940661 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.940771 kubelet[2612]: W0517 00:40:44.940760 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.940928 kubelet[2612]: E0517 00:40:44.940917 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.941104 kubelet[2612]: E0517 00:40:44.941097 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.941180 kubelet[2612]: W0517 00:40:44.941171 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.941297 kubelet[2612]: E0517 00:40:44.941288 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.941529 kubelet[2612]: E0517 00:40:44.941519 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.941621 kubelet[2612]: W0517 00:40:44.941612 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.941697 kubelet[2612]: E0517 00:40:44.941673 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.941937 kubelet[2612]: E0517 00:40:44.941926 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.942013 kubelet[2612]: W0517 00:40:44.942003 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.942064 kubelet[2612]: E0517 00:40:44.942056 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.942325 kubelet[2612]: E0517 00:40:44.942316 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944097 kubelet[2612]: W0517 00:40:44.942366 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.944097 kubelet[2612]: E0517 00:40:44.942378 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.944097 kubelet[2612]: E0517 00:40:44.942533 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944097 kubelet[2612]: W0517 00:40:44.942541 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.944097 kubelet[2612]: E0517 00:40:44.942549 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.944097 kubelet[2612]: E0517 00:40:44.943009 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944097 kubelet[2612]: W0517 00:40:44.943018 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.944097 kubelet[2612]: E0517 00:40:44.943028 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.944097 kubelet[2612]: E0517 00:40:44.943301 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944097 kubelet[2612]: W0517 00:40:44.943315 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.944846 kubelet[2612]: E0517 00:40:44.943328 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.944846 kubelet[2612]: E0517 00:40:44.943547 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944846 kubelet[2612]: W0517 00:40:44.943561 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.944846 kubelet[2612]: E0517 00:40:44.943574 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.944846 kubelet[2612]: E0517 00:40:44.943810 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944846 kubelet[2612]: W0517 00:40:44.943818 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.944846 kubelet[2612]: E0517 00:40:44.943827 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.944846 kubelet[2612]: E0517 00:40:44.944017 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.944846 kubelet[2612]: W0517 00:40:44.944024 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.945290 kubelet[2612]: E0517 00:40:44.944032 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.945627 kubelet[2612]: E0517 00:40:44.945612 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.945715 kubelet[2612]: W0517 00:40:44.945700 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.945773 kubelet[2612]: E0517 00:40:44.945763 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.946618 kubelet[2612]: E0517 00:40:44.946186 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.946726 kubelet[2612]: W0517 00:40:44.946710 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.946811 kubelet[2612]: E0517 00:40:44.946798 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.947100 kubelet[2612]: E0517 00:40:44.947089 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:44.947209 kubelet[2612]: W0517 00:40:44.947195 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:44.947276 kubelet[2612]: E0517 00:40:44.947267 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:44.965202 env[1739]: time="2025-05-17T00:40:44.965083090Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:44.965202 env[1739]: time="2025-05-17T00:40:44.965151439Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:44.965202 env[1739]: time="2025-05-17T00:40:44.965167341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:44.965660 env[1739]: time="2025-05-17T00:40:44.965610727Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed pid=3350 runtime=io.containerd.runc.v2 May 17 00:40:44.980125 systemd[1]: Started cri-containerd-f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed.scope. May 17 00:40:45.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.010000 audit: BPF prog-id=128 op=LOAD May 17 00:40:45.010000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.010000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3350 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:45.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323763326266343564633935643931393865303466663434353537 May 17 00:40:45.010000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.010000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3350 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:45.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323763326266343564633935643931393865303466663434353537 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.011000 audit: BPF prog-id=129 op=LOAD May 17 00:40:45.011000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185ea0 items=0 ppid=3350 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:45.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323763326266343564633935643931393865303466663434353537 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.012000 audit: BPF prog-id=130 op=LOAD May 17 00:40:45.012000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185ee8 items=0 ppid=3350 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:45.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323763326266343564633935643931393865303466663434353537 May 17 00:40:45.013000 audit: BPF prog-id=130 op=UNLOAD May 17 00:40:45.013000 audit: BPF prog-id=129 op=UNLOAD May 17 00:40:45.013000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:45.013000 audit: BPF prog-id=131 op=LOAD May 17 00:40:45.013000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001be2f8 items=0 ppid=3350 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:45.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323763326266343564633935643931393865303466663434353537 May 17 00:40:45.040653 kubelet[2612]: E0517 00:40:45.039920 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.040653 kubelet[2612]: W0517 00:40:45.039948 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.040653 kubelet[2612]: E0517 00:40:45.039990 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.040653 kubelet[2612]: E0517 00:40:45.040410 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.040653 kubelet[2612]: W0517 00:40:45.040423 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.040653 kubelet[2612]: E0517 00:40:45.040462 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.040653 kubelet[2612]: I0517 00:40:45.040488 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4732e8d0-52d1-4d24-aead-cc04fa7b437f-varrun\") pod \"csi-node-driver-q5bk6\" (UID: \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\") " pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:45.041140 kubelet[2612]: E0517 00:40:45.040727 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.041140 kubelet[2612]: W0517 00:40:45.040739 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.041140 kubelet[2612]: E0517 00:40:45.040757 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.041140 kubelet[2612]: E0517 00:40:45.040991 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.041140 kubelet[2612]: W0517 00:40:45.041001 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.041140 kubelet[2612]: E0517 00:40:45.041018 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.041443 kubelet[2612]: E0517 00:40:45.041236 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.041443 kubelet[2612]: W0517 00:40:45.041246 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.041443 kubelet[2612]: E0517 00:40:45.041262 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.041584 kubelet[2612]: E0517 00:40:45.041554 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.041584 kubelet[2612]: W0517 00:40:45.041568 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.041676 kubelet[2612]: E0517 00:40:45.041584 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.041831 kubelet[2612]: E0517 00:40:45.041803 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.041831 kubelet[2612]: W0517 00:40:45.041820 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.041954 kubelet[2612]: E0517 00:40:45.041837 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.042192 kubelet[2612]: E0517 00:40:45.042124 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.042192 kubelet[2612]: W0517 00:40:45.042137 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.042312 kubelet[2612]: E0517 00:40:45.042245 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.042312 kubelet[2612]: I0517 00:40:45.042275 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4732e8d0-52d1-4d24-aead-cc04fa7b437f-socket-dir\") pod \"csi-node-driver-q5bk6\" (UID: \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\") " pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:45.042455 kubelet[2612]: E0517 00:40:45.042439 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.042532 kubelet[2612]: W0517 00:40:45.042455 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.042591 kubelet[2612]: E0517 00:40:45.042549 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.042699 kubelet[2612]: E0517 00:40:45.042686 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.042772 kubelet[2612]: W0517 00:40:45.042701 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.042772 kubelet[2612]: E0517 00:40:45.042717 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.042934 kubelet[2612]: E0517 00:40:45.042920 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.043015 kubelet[2612]: W0517 00:40:45.042935 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.043015 kubelet[2612]: E0517 00:40:45.042951 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.043015 kubelet[2612]: I0517 00:40:45.042976 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jlx97\" (UniqueName: \"kubernetes.io/projected/4732e8d0-52d1-4d24-aead-cc04fa7b437f-kube-api-access-jlx97\") pod \"csi-node-driver-q5bk6\" (UID: \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\") " pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:45.043235 kubelet[2612]: E0517 00:40:45.043220 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.043312 kubelet[2612]: W0517 00:40:45.043237 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.043312 kubelet[2612]: E0517 00:40:45.043254 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.043481 kubelet[2612]: E0517 00:40:45.043458 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.043481 kubelet[2612]: W0517 00:40:45.043468 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.043577 kubelet[2612]: E0517 00:40:45.043479 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.043751 kubelet[2612]: E0517 00:40:45.043736 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.043830 kubelet[2612]: W0517 00:40:45.043752 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.043830 kubelet[2612]: E0517 00:40:45.043769 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.043998 kubelet[2612]: E0517 00:40:45.043985 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.044072 kubelet[2612]: W0517 00:40:45.043999 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.044072 kubelet[2612]: E0517 00:40:45.044015 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.044359 kubelet[2612]: E0517 00:40:45.044335 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.044359 kubelet[2612]: W0517 00:40:45.044351 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.044468 kubelet[2612]: E0517 00:40:45.044369 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.047849 kubelet[2612]: E0517 00:40:45.047359 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.047849 kubelet[2612]: W0517 00:40:45.047383 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.047849 kubelet[2612]: E0517 00:40:45.047414 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.047849 kubelet[2612]: E0517 00:40:45.047730 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.047849 kubelet[2612]: W0517 00:40:45.047742 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.047849 kubelet[2612]: E0517 00:40:45.047757 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.048252 kubelet[2612]: E0517 00:40:45.048001 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.048252 kubelet[2612]: W0517 00:40:45.048011 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.048252 kubelet[2612]: E0517 00:40:45.048023 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.051713 env[1739]: time="2025-05-17T00:40:45.051660337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rmfqz,Uid:d2d4e81f-5e36-4d81-ba28-8edbc2a72503,Namespace:calico-system,Attempt:0,} returns sandbox id \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\"" May 17 00:40:45.145654 kubelet[2612]: E0517 00:40:45.145610 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.145654 kubelet[2612]: W0517 00:40:45.145643 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.145851 kubelet[2612]: E0517 00:40:45.145666 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.146204 kubelet[2612]: E0517 00:40:45.146141 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.146204 kubelet[2612]: W0517 00:40:45.146155 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.146204 kubelet[2612]: E0517 00:40:45.146169 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.146535 kubelet[2612]: E0517 00:40:45.146496 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.146535 kubelet[2612]: W0517 00:40:45.146518 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.146535 kubelet[2612]: E0517 00:40:45.146533 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.146784 kubelet[2612]: E0517 00:40:45.146765 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.146784 kubelet[2612]: W0517 00:40:45.146778 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.146866 kubelet[2612]: E0517 00:40:45.146789 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.147004 kubelet[2612]: E0517 00:40:45.146965 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.147004 kubelet[2612]: W0517 00:40:45.146978 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.147137 kubelet[2612]: E0517 00:40:45.147057 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.147193 kubelet[2612]: E0517 00:40:45.147178 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.147193 kubelet[2612]: W0517 00:40:45.147189 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.147263 kubelet[2612]: E0517 00:40:45.147251 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.147363 kubelet[2612]: E0517 00:40:45.147348 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.147363 kubelet[2612]: W0517 00:40:45.147359 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.147419 kubelet[2612]: E0517 00:40:45.147368 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.147587 kubelet[2612]: E0517 00:40:45.147532 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.147587 kubelet[2612]: W0517 00:40:45.147546 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.147587 kubelet[2612]: E0517 00:40:45.147556 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.147781 kubelet[2612]: E0517 00:40:45.147766 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.147781 kubelet[2612]: W0517 00:40:45.147778 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.147838 kubelet[2612]: E0517 00:40:45.147788 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.148084 kubelet[2612]: E0517 00:40:45.148066 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.148084 kubelet[2612]: W0517 00:40:45.148079 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.148175 kubelet[2612]: E0517 00:40:45.148091 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.148433 kubelet[2612]: E0517 00:40:45.148399 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.148433 kubelet[2612]: W0517 00:40:45.148419 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.148433 kubelet[2612]: E0517 00:40:45.148430 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.149223 kubelet[2612]: E0517 00:40:45.149195 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.149223 kubelet[2612]: W0517 00:40:45.149210 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.149394 kubelet[2612]: E0517 00:40:45.149229 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.149496 kubelet[2612]: E0517 00:40:45.149476 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.149496 kubelet[2612]: W0517 00:40:45.149492 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.149630 kubelet[2612]: E0517 00:40:45.149506 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.149750 kubelet[2612]: E0517 00:40:45.149725 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.149750 kubelet[2612]: W0517 00:40:45.149741 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.149865 kubelet[2612]: E0517 00:40:45.149753 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.150973 kubelet[2612]: E0517 00:40:45.150954 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.150973 kubelet[2612]: W0517 00:40:45.150969 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.151084 kubelet[2612]: E0517 00:40:45.150985 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.158976 kubelet[2612]: E0517 00:40:45.158947 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:45.158976 kubelet[2612]: W0517 00:40:45.158967 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:45.158976 kubelet[2612]: E0517 00:40:45.158986 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:45.438585 systemd[1]: run-containerd-runc-k8s.io-8ec6ca98caea1e3eeebd5ab12a2ee256bf583cf229b47edb96b8d096ba870329-runc.nwUu92.mount: Deactivated successfully. May 17 00:40:46.118246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3101540895.mount: Deactivated successfully. May 17 00:40:46.891691 kubelet[2612]: E0517 00:40:46.891049 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:47.637383 env[1739]: time="2025-05-17T00:40:47.637313203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:47.640340 env[1739]: time="2025-05-17T00:40:47.640308396Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:47.642054 env[1739]: time="2025-05-17T00:40:47.641838846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:47.643346 env[1739]: time="2025-05-17T00:40:47.643317870Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:47.643774 env[1739]: time="2025-05-17T00:40:47.643736041Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:40:47.644895 env[1739]: time="2025-05-17T00:40:47.644860941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:40:47.663934 env[1739]: time="2025-05-17T00:40:47.663893264Z" level=info msg="CreateContainer within sandbox \"8ec6ca98caea1e3eeebd5ab12a2ee256bf583cf229b47edb96b8d096ba870329\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:40:47.681037 env[1739]: time="2025-05-17T00:40:47.680978893Z" level=info msg="CreateContainer within sandbox \"8ec6ca98caea1e3eeebd5ab12a2ee256bf583cf229b47edb96b8d096ba870329\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b81442ac0123d84b767064bd6be79a7df0be9dd743b46841f70ab52010c8b9e8\"" May 17 00:40:47.682719 env[1739]: time="2025-05-17T00:40:47.681721803Z" level=info msg="StartContainer for \"b81442ac0123d84b767064bd6be79a7df0be9dd743b46841f70ab52010c8b9e8\"" May 17 00:40:47.707914 systemd[1]: Started cri-containerd-b81442ac0123d84b767064bd6be79a7df0be9dd743b46841f70ab52010c8b9e8.scope. May 17 00:40:47.740697 kernel: kauditd_printk_skb: 139 callbacks suppressed May 17 00:40:47.740903 kernel: audit: type=1400 audit(1747442447.731:1003): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.754173 kernel: audit: type=1400 audit(1747442447.731:1004): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.754310 kernel: audit: type=1400 audit(1747442447.731:1005): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.762222 kernel: audit: type=1400 audit(1747442447.731:1006): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.769191 kernel: audit: type=1400 audit(1747442447.731:1007): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.784277 kernel: audit: type=1400 audit(1747442447.731:1008): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.784414 kernel: audit: type=1400 audit(1747442447.731:1009): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.791331 kernel: audit: type=1400 audit(1747442447.731:1010): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.798504 kernel: audit: type=1400 audit(1747442447.731:1011): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.805604 kernel: audit: type=1400 audit(1747442447.732:1012): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit: BPF prog-id=132 op=LOAD May 17 00:40:47.732000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3276 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:47.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313434326163303132336438346237363730363462643662653739 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3276 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:47.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313434326163303132336438346237363730363462643662653739 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.732000 audit: BPF prog-id=133 op=LOAD May 17 00:40:47.732000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c2020 items=0 ppid=3276 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:47.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313434326163303132336438346237363730363462643662653739 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.740000 audit: BPF prog-id=134 op=LOAD May 17 00:40:47.740000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c2068 items=0 ppid=3276 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:47.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313434326163303132336438346237363730363462643662653739 May 17 00:40:47.740000 audit: BPF prog-id=134 op=UNLOAD May 17 00:40:47.740000 audit: BPF prog-id=133 op=UNLOAD May 17 00:40:47.741000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:47.741000 audit: BPF prog-id=135 op=LOAD May 17 00:40:47.741000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c2478 items=0 ppid=3276 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:47.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313434326163303132336438346237363730363462643662653739 May 17 00:40:47.818135 env[1739]: time="2025-05-17T00:40:47.817203994Z" level=info msg="StartContainer for \"b81442ac0123d84b767064bd6be79a7df0be9dd743b46841f70ab52010c8b9e8\" returns successfully" May 17 00:40:48.079893 kubelet[2612]: E0517 00:40:48.079856 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.079893 kubelet[2612]: W0517 00:40:48.079887 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.080496 kubelet[2612]: E0517 00:40:48.079912 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.080496 kubelet[2612]: E0517 00:40:48.080187 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.080496 kubelet[2612]: W0517 00:40:48.080208 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.080496 kubelet[2612]: E0517 00:40:48.080222 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.080496 kubelet[2612]: E0517 00:40:48.080435 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.080496 kubelet[2612]: W0517 00:40:48.080454 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.080496 kubelet[2612]: E0517 00:40:48.080467 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.081005 kubelet[2612]: E0517 00:40:48.080690 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.081005 kubelet[2612]: W0517 00:40:48.080709 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.081005 kubelet[2612]: E0517 00:40:48.080721 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.081005 kubelet[2612]: E0517 00:40:48.080957 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.081005 kubelet[2612]: W0517 00:40:48.080976 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.081005 kubelet[2612]: E0517 00:40:48.080990 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.081317 kubelet[2612]: E0517 00:40:48.081211 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.081317 kubelet[2612]: W0517 00:40:48.081221 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.081317 kubelet[2612]: E0517 00:40:48.081233 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.081464 kubelet[2612]: E0517 00:40:48.081433 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.081464 kubelet[2612]: W0517 00:40:48.081443 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.081464 kubelet[2612]: E0517 00:40:48.081455 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.081669 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083145 kubelet[2612]: W0517 00:40:48.081682 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.081695 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.081949 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083145 kubelet[2612]: W0517 00:40:48.081968 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.081983 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.082210 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083145 kubelet[2612]: W0517 00:40:48.082221 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.082235 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083145 kubelet[2612]: E0517 00:40:48.082454 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083670 kubelet[2612]: W0517 00:40:48.082476 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.083670 kubelet[2612]: E0517 00:40:48.082490 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083670 kubelet[2612]: E0517 00:40:48.082715 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083670 kubelet[2612]: W0517 00:40:48.082736 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.083670 kubelet[2612]: E0517 00:40:48.082750 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083670 kubelet[2612]: E0517 00:40:48.082982 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083670 kubelet[2612]: W0517 00:40:48.083001 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.083670 kubelet[2612]: E0517 00:40:48.083014 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.083670 kubelet[2612]: E0517 00:40:48.083243 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.083670 kubelet[2612]: W0517 00:40:48.083261 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.084071 kubelet[2612]: E0517 00:40:48.083273 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.084071 kubelet[2612]: E0517 00:40:48.083492 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.084071 kubelet[2612]: W0517 00:40:48.083503 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.084071 kubelet[2612]: E0517 00:40:48.083523 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.171904 kubelet[2612]: E0517 00:40:48.171870 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.171904 kubelet[2612]: W0517 00:40:48.171899 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.172171 kubelet[2612]: E0517 00:40:48.171924 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.172301 kubelet[2612]: E0517 00:40:48.172283 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.172382 kubelet[2612]: W0517 00:40:48.172301 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.172382 kubelet[2612]: E0517 00:40:48.172328 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.172647 kubelet[2612]: E0517 00:40:48.172626 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.172647 kubelet[2612]: W0517 00:40:48.172643 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.172778 kubelet[2612]: E0517 00:40:48.172661 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.172980 kubelet[2612]: E0517 00:40:48.172962 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.172980 kubelet[2612]: W0517 00:40:48.172979 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.173127 kubelet[2612]: E0517 00:40:48.172998 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.173297 kubelet[2612]: E0517 00:40:48.173279 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.173365 kubelet[2612]: W0517 00:40:48.173297 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.173365 kubelet[2612]: E0517 00:40:48.173322 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.173582 kubelet[2612]: E0517 00:40:48.173565 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.173582 kubelet[2612]: W0517 00:40:48.173582 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.173733 kubelet[2612]: E0517 00:40:48.173702 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.173907 kubelet[2612]: E0517 00:40:48.173891 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.173985 kubelet[2612]: W0517 00:40:48.173917 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.174035 kubelet[2612]: E0517 00:40:48.174018 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.174215 kubelet[2612]: E0517 00:40:48.174192 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.174299 kubelet[2612]: W0517 00:40:48.174216 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.174352 kubelet[2612]: E0517 00:40:48.174341 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.174525 kubelet[2612]: E0517 00:40:48.174509 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.174525 kubelet[2612]: W0517 00:40:48.174525 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.174624 kubelet[2612]: E0517 00:40:48.174542 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.175001 kubelet[2612]: E0517 00:40:48.174982 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.175001 kubelet[2612]: W0517 00:40:48.174999 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.175157 kubelet[2612]: E0517 00:40:48.175016 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.175298 kubelet[2612]: E0517 00:40:48.175276 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.175357 kubelet[2612]: W0517 00:40:48.175299 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.175357 kubelet[2612]: E0517 00:40:48.175317 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.175566 kubelet[2612]: E0517 00:40:48.175551 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.175566 kubelet[2612]: W0517 00:40:48.175566 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.175684 kubelet[2612]: E0517 00:40:48.175665 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.175844 kubelet[2612]: E0517 00:40:48.175830 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.175906 kubelet[2612]: W0517 00:40:48.175845 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.175906 kubelet[2612]: E0517 00:40:48.175862 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.176109 kubelet[2612]: E0517 00:40:48.176087 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.176191 kubelet[2612]: W0517 00:40:48.176110 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.176191 kubelet[2612]: E0517 00:40:48.176139 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.176430 kubelet[2612]: E0517 00:40:48.176414 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.176430 kubelet[2612]: W0517 00:40:48.176430 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.176547 kubelet[2612]: E0517 00:40:48.176447 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.177376 kubelet[2612]: E0517 00:40:48.177358 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.177376 kubelet[2612]: W0517 00:40:48.177375 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.177551 kubelet[2612]: E0517 00:40:48.177507 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.177729 kubelet[2612]: E0517 00:40:48.177713 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.177729 kubelet[2612]: W0517 00:40:48.177729 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.177837 kubelet[2612]: E0517 00:40:48.177751 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.178227 kubelet[2612]: E0517 00:40:48.178210 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:40:48.178227 kubelet[2612]: W0517 00:40:48.178227 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:40:48.178353 kubelet[2612]: E0517 00:40:48.178240 2612 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:40:48.890699 kubelet[2612]: E0517 00:40:48.890660 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:48.908704 env[1739]: time="2025-05-17T00:40:48.908650730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:48.910753 env[1739]: time="2025-05-17T00:40:48.910707162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:48.912804 env[1739]: time="2025-05-17T00:40:48.912774003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:48.914224 env[1739]: time="2025-05-17T00:40:48.914187914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:48.914773 env[1739]: time="2025-05-17T00:40:48.914737307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:40:48.918608 env[1739]: time="2025-05-17T00:40:48.917803379Z" level=info msg="CreateContainer within sandbox \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:40:48.936201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2402810945.mount: Deactivated successfully. May 17 00:40:48.950202 env[1739]: time="2025-05-17T00:40:48.949012687Z" level=info msg="CreateContainer within sandbox \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff\"" May 17 00:40:48.953378 env[1739]: time="2025-05-17T00:40:48.952303891Z" level=info msg="StartContainer for \"9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff\"" May 17 00:40:48.985601 systemd[1]: Started cri-containerd-9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff.scope. May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f4ea847a7e8 items=0 ppid=3350 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:49.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633031613362333938643465663066396436333237663231363937 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit: BPF prog-id=136 op=LOAD May 17 00:40:49.034000 audit[3502]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002c9b98 items=0 ppid=3350 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:49.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633031613362333938643465663066396436333237663231363937 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit: BPF prog-id=137 op=LOAD May 17 00:40:49.034000 audit[3502]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002c9be8 items=0 ppid=3350 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:49.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633031613362333938643465663066396436333237663231363937 May 17 00:40:49.034000 audit: BPF prog-id=137 op=UNLOAD May 17 00:40:49.034000 audit: BPF prog-id=136 op=UNLOAD May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { perfmon } for pid=3502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit[3502]: AVC avc: denied { bpf } for pid=3502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:49.034000 audit: BPF prog-id=138 op=LOAD May 17 00:40:49.034000 audit[3502]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002c9c78 items=0 ppid=3350 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:49.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633031613362333938643465663066396436333237663231363937 May 17 00:40:49.054340 env[1739]: time="2025-05-17T00:40:49.054289392Z" level=info msg="StartContainer for \"9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff\" returns successfully" May 17 00:40:49.067330 systemd[1]: cri-containerd-9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff.scope: Deactivated successfully. May 17 00:40:49.071000 audit: BPF prog-id=138 op=UNLOAD May 17 00:40:49.075610 kubelet[2612]: I0517 00:40:49.075244 2612 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:40:49.108908 kubelet[2612]: I0517 00:40:49.107544 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6f969579d5-ss8s8" podStartSLOduration=2.215767736 podStartE2EDuration="5.107523027s" podCreationTimestamp="2025-05-17 00:40:44 +0000 UTC" firstStartedPulling="2025-05-17 00:40:44.752922429 +0000 UTC m=+20.175227292" lastFinishedPulling="2025-05-17 00:40:47.64467772 +0000 UTC m=+23.066982583" observedRunningTime="2025-05-17 00:40:48.11417394 +0000 UTC m=+23.536478814" watchObservedRunningTime="2025-05-17 00:40:49.107523027 +0000 UTC m=+24.529827901" May 17 00:40:49.189715 env[1739]: time="2025-05-17T00:40:49.188428918Z" level=info msg="shim disconnected" id=9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff May 17 00:40:49.189715 env[1739]: time="2025-05-17T00:40:49.188471682Z" level=warning msg="cleaning up after shim disconnected" id=9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff namespace=k8s.io May 17 00:40:49.189715 env[1739]: time="2025-05-17T00:40:49.188484088Z" level=info msg="cleaning up dead shim" May 17 00:40:49.196423 env[1739]: time="2025-05-17T00:40:49.196367241Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:40:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3544 runtime=io.containerd.runc.v2\n" May 17 00:40:49.928691 systemd[1]: run-containerd-runc-k8s.io-9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff-runc.ziKzoJ.mount: Deactivated successfully. May 17 00:40:49.928821 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9ac01a3b398d4ef0f9d6327f216971d9a7e0d8c0002f2d6cae2e3bc5843cf9ff-rootfs.mount: Deactivated successfully. May 17 00:40:50.079067 env[1739]: time="2025-05-17T00:40:50.079029830Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:40:50.893481 kubelet[2612]: E0517 00:40:50.893430 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:52.891467 kubelet[2612]: E0517 00:40:52.891365 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:54.102781 env[1739]: time="2025-05-17T00:40:54.102736556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:54.104586 env[1739]: time="2025-05-17T00:40:54.104549483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:54.105270 env[1739]: time="2025-05-17T00:40:54.105231345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:54.107924 env[1739]: time="2025-05-17T00:40:54.107887339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:54.108358 env[1739]: time="2025-05-17T00:40:54.108327593Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:40:54.110685 env[1739]: time="2025-05-17T00:40:54.110657502Z" level=info msg="CreateContainer within sandbox \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:40:54.125238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2134949863.mount: Deactivated successfully. May 17 00:40:54.136329 env[1739]: time="2025-05-17T00:40:54.136275227Z" level=info msg="CreateContainer within sandbox \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c\"" May 17 00:40:54.144374 env[1739]: time="2025-05-17T00:40:54.140613890Z" level=info msg="StartContainer for \"1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c\"" May 17 00:40:54.179175 systemd[1]: run-containerd-runc-k8s.io-1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c-runc.8e39MB.mount: Deactivated successfully. May 17 00:40:54.183621 systemd[1]: Started cri-containerd-1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c.scope. May 17 00:40:54.226092 kernel: kauditd_printk_skb: 91 callbacks suppressed May 17 00:40:54.234477 kernel: audit: type=1400 audit(1747442454.217:1028): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.234590 kernel: audit: type=1300 audit(1747442454.217:1028): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9486626ef8 items=0 ppid=3350 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:54.217000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9486626ef8 items=0 ppid=3350 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:54.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313036386531636139343134646339373766306337623833616232 May 17 00:40:54.244190 kernel: audit: type=1327 audit(1747442454.217:1028): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313036386531636139343134646339373766306337623833616232 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.264177 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.264328 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.271175 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.280071 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.280233 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.284262 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.297850 kernel: audit: type=1400 audit(1747442454.217:1029): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.217000 audit: BPF prog-id=139 op=LOAD May 17 00:40:54.217000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001ff818 items=0 ppid=3350 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:54.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313036386531636139343134646339373766306337623833616232 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit: BPF prog-id=140 op=LOAD May 17 00:40:54.226000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001ff868 items=0 ppid=3350 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:54.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313036386531636139343134646339373766306337623833616232 May 17 00:40:54.226000 audit: BPF prog-id=140 op=UNLOAD May 17 00:40:54.226000 audit: BPF prog-id=139 op=UNLOAD May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:54.226000 audit: BPF prog-id=141 op=LOAD May 17 00:40:54.226000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001ff8f8 items=0 ppid=3350 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:54.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313036386531636139343134646339373766306337623833616232 May 17 00:40:54.313325 env[1739]: time="2025-05-17T00:40:54.302310461Z" level=info msg="StartContainer for \"1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c\" returns successfully" May 17 00:40:54.891047 kubelet[2612]: E0517 00:40:54.891001 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:56.211313 env[1739]: time="2025-05-17T00:40:56.211254668Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:40:56.214038 systemd[1]: cri-containerd-1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c.scope: Deactivated successfully. May 17 00:40:56.218000 audit: BPF prog-id=141 op=UNLOAD May 17 00:40:56.249665 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c-rootfs.mount: Deactivated successfully. May 17 00:40:56.254488 env[1739]: time="2025-05-17T00:40:56.254430796Z" level=info msg="shim disconnected" id=1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c May 17 00:40:56.255209 env[1739]: time="2025-05-17T00:40:56.254688015Z" level=warning msg="cleaning up after shim disconnected" id=1c1068e1ca9414dc977f0c7b83ab27b79735c11763f0790ceecee5ee15d2be8c namespace=k8s.io May 17 00:40:56.255209 env[1739]: time="2025-05-17T00:40:56.254711617Z" level=info msg="cleaning up dead shim" May 17 00:40:56.255590 kubelet[2612]: I0517 00:40:56.252234 2612 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:40:56.266957 env[1739]: time="2025-05-17T00:40:56.266909711Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:40:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3607 runtime=io.containerd.runc.v2\n" May 17 00:40:56.317373 systemd[1]: Created slice kubepods-burstable-pod5fe1896b_fa6b_4c91_abac_c9f76ba079a0.slice. May 17 00:40:56.327395 systemd[1]: Created slice kubepods-besteffort-pod942512a4_77b8_4313_9871_7733dbf6b00d.slice. May 17 00:40:56.339049 systemd[1]: Created slice kubepods-burstable-pod8e5acfaf_22f8_46b4_9f3c_8f4ec1a47287.slice. May 17 00:40:56.360830 kubelet[2612]: W0517 00:40:56.360783 2612 reflector.go:569] object-"calico-system"/"whisker-ca-bundle": failed to list *v1.ConfigMap: configmaps "whisker-ca-bundle" is forbidden: User "system:node:ip-172-31-25-158" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-158' and this object May 17 00:40:56.361052 kubelet[2612]: E0517 00:40:56.361024 2612 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"whisker-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"whisker-ca-bundle\" is forbidden: User \"system:node:ip-172-31-25-158\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ip-172-31-25-158' and this object" logger="UnhandledError" May 17 00:40:56.387400 systemd[1]: Created slice kubepods-besteffort-poda3f52808_2a82_44e1_80ef_38473ae77d9b.slice. May 17 00:40:56.397345 systemd[1]: Created slice kubepods-besteffort-podb7d1186a_bf30_4dec_8152_532be5293024.slice. May 17 00:40:56.404735 systemd[1]: Created slice kubepods-besteffort-pod0106ba82_539e_49ae_85cf_21d470967512.slice. May 17 00:40:56.416530 systemd[1]: Created slice kubepods-besteffort-podbdc4c222_6e91_430d_bb4e_7e63d4524888.slice. May 17 00:40:56.444728 kubelet[2612]: I0517 00:40:56.444679 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-ca-bundle\") pod \"whisker-f87869957-bljjj\" (UID: \"942512a4-77b8-4313-9871-7733dbf6b00d\") " pod="calico-system/whisker-f87869957-bljjj" May 17 00:40:56.445022 kubelet[2612]: I0517 00:40:56.445000 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wzsrz\" (UniqueName: \"kubernetes.io/projected/5fe1896b-fa6b-4c91-abac-c9f76ba079a0-kube-api-access-wzsrz\") pod \"coredns-668d6bf9bc-h4plp\" (UID: \"5fe1896b-fa6b-4c91-abac-c9f76ba079a0\") " pod="kube-system/coredns-668d6bf9bc-h4plp" May 17 00:40:56.445204 kubelet[2612]: I0517 00:40:56.445183 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b7d1186a-bf30-4dec-8152-532be5293024-calico-apiserver-certs\") pod \"calico-apiserver-6b4b9bd5c8-ncxj8\" (UID: \"b7d1186a-bf30-4dec-8152-532be5293024\") " pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" May 17 00:40:56.445334 kubelet[2612]: I0517 00:40:56.445317 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a3f52808-2a82-44e1-80ef-38473ae77d9b-calico-apiserver-certs\") pod \"calico-apiserver-6b4b9bd5c8-55s66\" (UID: \"a3f52808-2a82-44e1-80ef-38473ae77d9b\") " pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" May 17 00:40:56.445501 kubelet[2612]: I0517 00:40:56.445483 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/bdc4c222-6e91-430d-bb4e-7e63d4524888-config\") pod \"goldmane-78d55f7ddc-vpk7m\" (UID: \"bdc4c222-6e91-430d-bb4e-7e63d4524888\") " pod="calico-system/goldmane-78d55f7ddc-vpk7m" May 17 00:40:56.445668 kubelet[2612]: I0517 00:40:56.445650 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j9lf9\" (UniqueName: \"kubernetes.io/projected/bdc4c222-6e91-430d-bb4e-7e63d4524888-kube-api-access-j9lf9\") pod \"goldmane-78d55f7ddc-vpk7m\" (UID: \"bdc4c222-6e91-430d-bb4e-7e63d4524888\") " pod="calico-system/goldmane-78d55f7ddc-vpk7m" May 17 00:40:56.446307 kubelet[2612]: I0517 00:40:56.446283 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bdc4c222-6e91-430d-bb4e-7e63d4524888-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-vpk7m\" (UID: \"bdc4c222-6e91-430d-bb4e-7e63d4524888\") " pod="calico-system/goldmane-78d55f7ddc-vpk7m" May 17 00:40:56.446408 kubelet[2612]: I0517 00:40:56.446333 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287-config-volume\") pod \"coredns-668d6bf9bc-6zzbw\" (UID: \"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287\") " pod="kube-system/coredns-668d6bf9bc-6zzbw" May 17 00:40:56.446408 kubelet[2612]: I0517 00:40:56.446366 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l5d95\" (UniqueName: \"kubernetes.io/projected/942512a4-77b8-4313-9871-7733dbf6b00d-kube-api-access-l5d95\") pod \"whisker-f87869957-bljjj\" (UID: \"942512a4-77b8-4313-9871-7733dbf6b00d\") " pod="calico-system/whisker-f87869957-bljjj" May 17 00:40:56.446514 kubelet[2612]: I0517 00:40:56.446414 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5fe1896b-fa6b-4c91-abac-c9f76ba079a0-config-volume\") pod \"coredns-668d6bf9bc-h4plp\" (UID: \"5fe1896b-fa6b-4c91-abac-c9f76ba079a0\") " pod="kube-system/coredns-668d6bf9bc-h4plp" May 17 00:40:56.446514 kubelet[2612]: I0517 00:40:56.446441 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jtnj2\" (UniqueName: \"kubernetes.io/projected/a3f52808-2a82-44e1-80ef-38473ae77d9b-kube-api-access-jtnj2\") pod \"calico-apiserver-6b4b9bd5c8-55s66\" (UID: \"a3f52808-2a82-44e1-80ef-38473ae77d9b\") " pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" May 17 00:40:56.446514 kubelet[2612]: I0517 00:40:56.446487 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0106ba82-539e-49ae-85cf-21d470967512-tigera-ca-bundle\") pod \"calico-kube-controllers-577d59dd8d-5cp45\" (UID: \"0106ba82-539e-49ae-85cf-21d470967512\") " pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" May 17 00:40:56.446660 kubelet[2612]: I0517 00:40:56.446513 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-backend-key-pair\") pod \"whisker-f87869957-bljjj\" (UID: \"942512a4-77b8-4313-9871-7733dbf6b00d\") " pod="calico-system/whisker-f87869957-bljjj" May 17 00:40:56.446660 kubelet[2612]: I0517 00:40:56.446540 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/bdc4c222-6e91-430d-bb4e-7e63d4524888-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-vpk7m\" (UID: \"bdc4c222-6e91-430d-bb4e-7e63d4524888\") " pod="calico-system/goldmane-78d55f7ddc-vpk7m" May 17 00:40:56.446660 kubelet[2612]: I0517 00:40:56.446580 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l6r5x\" (UniqueName: \"kubernetes.io/projected/b7d1186a-bf30-4dec-8152-532be5293024-kube-api-access-l6r5x\") pod \"calico-apiserver-6b4b9bd5c8-ncxj8\" (UID: \"b7d1186a-bf30-4dec-8152-532be5293024\") " pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" May 17 00:40:56.446660 kubelet[2612]: I0517 00:40:56.446634 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dr9wg\" (UniqueName: \"kubernetes.io/projected/0106ba82-539e-49ae-85cf-21d470967512-kube-api-access-dr9wg\") pod \"calico-kube-controllers-577d59dd8d-5cp45\" (UID: \"0106ba82-539e-49ae-85cf-21d470967512\") " pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" May 17 00:40:56.446837 kubelet[2612]: I0517 00:40:56.446669 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z4tv9\" (UniqueName: \"kubernetes.io/projected/8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287-kube-api-access-z4tv9\") pod \"coredns-668d6bf9bc-6zzbw\" (UID: \"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287\") " pod="kube-system/coredns-668d6bf9bc-6zzbw" May 17 00:40:56.624540 env[1739]: time="2025-05-17T00:40:56.624496164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-h4plp,Uid:5fe1896b-fa6b-4c91-abac-c9f76ba079a0,Namespace:kube-system,Attempt:0,}" May 17 00:40:56.682867 env[1739]: time="2025-05-17T00:40:56.682823486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zzbw,Uid:8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287,Namespace:kube-system,Attempt:0,}" May 17 00:40:56.693780 env[1739]: time="2025-05-17T00:40:56.693726743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-55s66,Uid:a3f52808-2a82-44e1-80ef-38473ae77d9b,Namespace:calico-apiserver,Attempt:0,}" May 17 00:40:56.702282 env[1739]: time="2025-05-17T00:40:56.702237984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-ncxj8,Uid:b7d1186a-bf30-4dec-8152-532be5293024,Namespace:calico-apiserver,Attempt:0,}" May 17 00:40:56.713458 env[1739]: time="2025-05-17T00:40:56.713411308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-577d59dd8d-5cp45,Uid:0106ba82-539e-49ae-85cf-21d470967512,Namespace:calico-system,Attempt:0,}" May 17 00:40:56.721136 env[1739]: time="2025-05-17T00:40:56.721092864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vpk7m,Uid:bdc4c222-6e91-430d-bb4e-7e63d4524888,Namespace:calico-system,Attempt:0,}" May 17 00:40:56.897150 systemd[1]: Created slice kubepods-besteffort-pod4732e8d0_52d1_4d24_aead_cc04fa7b437f.slice. May 17 00:40:56.930694 env[1739]: time="2025-05-17T00:40:56.902635947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q5bk6,Uid:4732e8d0-52d1-4d24-aead-cc04fa7b437f,Namespace:calico-system,Attempt:0,}" May 17 00:40:57.070524 env[1739]: time="2025-05-17T00:40:57.070399395Z" level=error msg="Failed to destroy network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.071303 env[1739]: time="2025-05-17T00:40:57.071252899Z" level=error msg="encountered an error cleaning up failed sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.071504 env[1739]: time="2025-05-17T00:40:57.071469343Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-h4plp,Uid:5fe1896b-fa6b-4c91-abac-c9f76ba079a0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.077392 kubelet[2612]: E0517 00:40:57.077327 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.080424 kubelet[2612]: E0517 00:40:57.080361 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-h4plp" May 17 00:40:57.080585 kubelet[2612]: E0517 00:40:57.080444 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-h4plp" May 17 00:40:57.080585 kubelet[2612]: E0517 00:40:57.080510 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-h4plp_kube-system(5fe1896b-fa6b-4c91-abac-c9f76ba079a0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-h4plp_kube-system(5fe1896b-fa6b-4c91-abac-c9f76ba079a0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-h4plp" podUID="5fe1896b-fa6b-4c91-abac-c9f76ba079a0" May 17 00:40:57.115489 env[1739]: time="2025-05-17T00:40:57.115447350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:40:57.124888 kubelet[2612]: I0517 00:40:57.124806 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:40:57.125601 env[1739]: time="2025-05-17T00:40:57.125565635Z" level=info msg="StopPodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\"" May 17 00:40:57.175020 env[1739]: time="2025-05-17T00:40:57.174877596Z" level=error msg="Failed to destroy network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.175699 env[1739]: time="2025-05-17T00:40:57.175648839Z" level=error msg="encountered an error cleaning up failed sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.175935 env[1739]: time="2025-05-17T00:40:57.175885744Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vpk7m,Uid:bdc4c222-6e91-430d-bb4e-7e63d4524888,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.176360 kubelet[2612]: E0517 00:40:57.176318 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.176473 kubelet[2612]: E0517 00:40:57.176390 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-vpk7m" May 17 00:40:57.176473 kubelet[2612]: E0517 00:40:57.176421 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-vpk7m" May 17 00:40:57.178359 kubelet[2612]: E0517 00:40:57.176492 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-vpk7m_calico-system(bdc4c222-6e91-430d-bb4e-7e63d4524888)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-vpk7m_calico-system(bdc4c222-6e91-430d-bb4e-7e63d4524888)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:40:57.196297 env[1739]: time="2025-05-17T00:40:57.196229865Z" level=error msg="Failed to destroy network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.196615 env[1739]: time="2025-05-17T00:40:57.196270596Z" level=error msg="Failed to destroy network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.196951 env[1739]: time="2025-05-17T00:40:57.196902739Z" level=error msg="encountered an error cleaning up failed sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.197144 env[1739]: time="2025-05-17T00:40:57.197092585Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-577d59dd8d-5cp45,Uid:0106ba82-539e-49ae-85cf-21d470967512,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.197366 env[1739]: time="2025-05-17T00:40:57.197042575Z" level=error msg="encountered an error cleaning up failed sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.197625 kubelet[2612]: E0517 00:40:57.197588 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.197776 kubelet[2612]: E0517 00:40:57.197656 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" May 17 00:40:57.197776 kubelet[2612]: E0517 00:40:57.197687 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" May 17 00:40:57.197898 kubelet[2612]: E0517 00:40:57.197759 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-577d59dd8d-5cp45_calico-system(0106ba82-539e-49ae-85cf-21d470967512)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-577d59dd8d-5cp45_calico-system(0106ba82-539e-49ae-85cf-21d470967512)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" podUID="0106ba82-539e-49ae-85cf-21d470967512" May 17 00:40:57.199551 env[1739]: time="2025-05-17T00:40:57.197605402Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zzbw,Uid:8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.200189 kubelet[2612]: E0517 00:40:57.200012 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.200189 kubelet[2612]: E0517 00:40:57.200072 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6zzbw" May 17 00:40:57.200504 kubelet[2612]: E0517 00:40:57.200099 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6zzbw" May 17 00:40:57.200504 kubelet[2612]: E0517 00:40:57.200429 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-6zzbw_kube-system(8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-6zzbw_kube-system(8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6zzbw" podUID="8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287" May 17 00:40:57.211070 env[1739]: time="2025-05-17T00:40:57.211010812Z" level=error msg="Failed to destroy network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.213257 env[1739]: time="2025-05-17T00:40:57.213201368Z" level=error msg="encountered an error cleaning up failed sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.213733 env[1739]: time="2025-05-17T00:40:57.213688640Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-ncxj8,Uid:b7d1186a-bf30-4dec-8152-532be5293024,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.214307 kubelet[2612]: E0517 00:40:57.214255 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.214417 kubelet[2612]: E0517 00:40:57.214335 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" May 17 00:40:57.214417 kubelet[2612]: E0517 00:40:57.214360 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" May 17 00:40:57.216305 kubelet[2612]: E0517 00:40:57.214425 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6b4b9bd5c8-ncxj8_calico-apiserver(b7d1186a-bf30-4dec-8152-532be5293024)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6b4b9bd5c8-ncxj8_calico-apiserver(b7d1186a-bf30-4dec-8152-532be5293024)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" podUID="b7d1186a-bf30-4dec-8152-532be5293024" May 17 00:40:57.220949 env[1739]: time="2025-05-17T00:40:57.220891991Z" level=error msg="Failed to destroy network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.221563 env[1739]: time="2025-05-17T00:40:57.221514661Z" level=error msg="encountered an error cleaning up failed sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.221841 env[1739]: time="2025-05-17T00:40:57.221728492Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-55s66,Uid:a3f52808-2a82-44e1-80ef-38473ae77d9b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.222187 kubelet[2612]: E0517 00:40:57.222146 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.222298 kubelet[2612]: E0517 00:40:57.222215 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" May 17 00:40:57.222298 kubelet[2612]: E0517 00:40:57.222246 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" May 17 00:40:57.222400 kubelet[2612]: E0517 00:40:57.222305 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6b4b9bd5c8-55s66_calico-apiserver(a3f52808-2a82-44e1-80ef-38473ae77d9b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6b4b9bd5c8-55s66_calico-apiserver(a3f52808-2a82-44e1-80ef-38473ae77d9b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" podUID="a3f52808-2a82-44e1-80ef-38473ae77d9b" May 17 00:40:57.224459 env[1739]: time="2025-05-17T00:40:57.224418089Z" level=error msg="Failed to destroy network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.224956 env[1739]: time="2025-05-17T00:40:57.224917954Z" level=error msg="encountered an error cleaning up failed sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.225206 env[1739]: time="2025-05-17T00:40:57.225098032Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q5bk6,Uid:4732e8d0-52d1-4d24-aead-cc04fa7b437f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.226185 kubelet[2612]: E0517 00:40:57.226138 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.226298 kubelet[2612]: E0517 00:40:57.226209 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:57.226298 kubelet[2612]: E0517 00:40:57.226237 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-q5bk6" May 17 00:40:57.226400 kubelet[2612]: E0517 00:40:57.226302 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-q5bk6_calico-system(4732e8d0-52d1-4d24-aead-cc04fa7b437f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-q5bk6_calico-system(4732e8d0-52d1-4d24-aead-cc04fa7b437f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:57.273876 env[1739]: time="2025-05-17T00:40:57.273825600Z" level=error msg="StopPodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" failed" error="failed to destroy network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.274487 kubelet[2612]: E0517 00:40:57.274276 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:40:57.274487 kubelet[2612]: E0517 00:40:57.274349 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719"} May 17 00:40:57.274487 kubelet[2612]: E0517 00:40:57.274416 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5fe1896b-fa6b-4c91-abac-c9f76ba079a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:57.274487 kubelet[2612]: E0517 00:40:57.274449 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5fe1896b-fa6b-4c91-abac-c9f76ba079a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-h4plp" podUID="5fe1896b-fa6b-4c91-abac-c9f76ba079a0" May 17 00:40:57.533986 env[1739]: time="2025-05-17T00:40:57.533941976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-f87869957-bljjj,Uid:942512a4-77b8-4313-9871-7733dbf6b00d,Namespace:calico-system,Attempt:0,}" May 17 00:40:57.607072 env[1739]: time="2025-05-17T00:40:57.607012638Z" level=error msg="Failed to destroy network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.610339 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336-shm.mount: Deactivated successfully. May 17 00:40:57.611529 env[1739]: time="2025-05-17T00:40:57.611472785Z" level=error msg="encountered an error cleaning up failed sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.611728 env[1739]: time="2025-05-17T00:40:57.611694203Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-f87869957-bljjj,Uid:942512a4-77b8-4313-9871-7733dbf6b00d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.612278 kubelet[2612]: E0517 00:40:57.612238 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:57.612382 kubelet[2612]: E0517 00:40:57.612299 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-f87869957-bljjj" May 17 00:40:57.612382 kubelet[2612]: E0517 00:40:57.612326 2612 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-f87869957-bljjj" May 17 00:40:57.612480 kubelet[2612]: E0517 00:40:57.612377 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-f87869957-bljjj_calico-system(942512a4-77b8-4313-9871-7733dbf6b00d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-f87869957-bljjj_calico-system(942512a4-77b8-4313-9871-7733dbf6b00d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-f87869957-bljjj" podUID="942512a4-77b8-4313-9871-7733dbf6b00d" May 17 00:40:58.121902 kubelet[2612]: I0517 00:40:58.121867 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:40:58.122694 env[1739]: time="2025-05-17T00:40:58.122641541Z" level=info msg="StopPodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\"" May 17 00:40:58.125824 kubelet[2612]: I0517 00:40:58.125493 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:40:58.126757 env[1739]: time="2025-05-17T00:40:58.126694143Z" level=info msg="StopPodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\"" May 17 00:40:58.130521 kubelet[2612]: I0517 00:40:58.130066 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:40:58.130898 env[1739]: time="2025-05-17T00:40:58.130862890Z" level=info msg="StopPodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\"" May 17 00:40:58.132283 kubelet[2612]: I0517 00:40:58.132261 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:40:58.133472 env[1739]: time="2025-05-17T00:40:58.133334419Z" level=info msg="StopPodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\"" May 17 00:40:58.141821 kubelet[2612]: I0517 00:40:58.141173 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:40:58.142325 env[1739]: time="2025-05-17T00:40:58.142284657Z" level=info msg="StopPodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\"" May 17 00:40:58.144899 kubelet[2612]: I0517 00:40:58.144325 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:40:58.145352 env[1739]: time="2025-05-17T00:40:58.145316145Z" level=info msg="StopPodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\"" May 17 00:40:58.147945 kubelet[2612]: I0517 00:40:58.147409 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:40:58.149921 env[1739]: time="2025-05-17T00:40:58.149884268Z" level=info msg="StopPodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\"" May 17 00:40:58.219263 env[1739]: time="2025-05-17T00:40:58.219194210Z" level=error msg="StopPodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" failed" error="failed to destroy network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.220136 kubelet[2612]: E0517 00:40:58.219965 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:40:58.220136 kubelet[2612]: E0517 00:40:58.220026 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17"} May 17 00:40:58.220136 kubelet[2612]: E0517 00:40:58.220077 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bdc4c222-6e91-430d-bb4e-7e63d4524888\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.220519 kubelet[2612]: E0517 00:40:58.220471 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bdc4c222-6e91-430d-bb4e-7e63d4524888\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:40:58.224811 env[1739]: time="2025-05-17T00:40:58.224744463Z" level=error msg="StopPodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" failed" error="failed to destroy network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.225378 kubelet[2612]: E0517 00:40:58.225195 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:40:58.225378 kubelet[2612]: E0517 00:40:58.225249 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d"} May 17 00:40:58.225378 kubelet[2612]: E0517 00:40:58.225296 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0106ba82-539e-49ae-85cf-21d470967512\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.225378 kubelet[2612]: E0517 00:40:58.225333 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0106ba82-539e-49ae-85cf-21d470967512\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" podUID="0106ba82-539e-49ae-85cf-21d470967512" May 17 00:40:58.294671 env[1739]: time="2025-05-17T00:40:58.294567485Z" level=error msg="StopPodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" failed" error="failed to destroy network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.294951 kubelet[2612]: E0517 00:40:58.294897 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:40:58.295507 kubelet[2612]: E0517 00:40:58.294972 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4"} May 17 00:40:58.295507 kubelet[2612]: E0517 00:40:58.295083 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3f52808-2a82-44e1-80ef-38473ae77d9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.295507 kubelet[2612]: E0517 00:40:58.295155 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3f52808-2a82-44e1-80ef-38473ae77d9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" podUID="a3f52808-2a82-44e1-80ef-38473ae77d9b" May 17 00:40:58.297207 env[1739]: time="2025-05-17T00:40:58.296556657Z" level=error msg="StopPodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" failed" error="failed to destroy network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.297363 kubelet[2612]: E0517 00:40:58.297321 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:40:58.297516 kubelet[2612]: E0517 00:40:58.297427 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926"} May 17 00:40:58.297516 kubelet[2612]: E0517 00:40:58.297504 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7d1186a-bf30-4dec-8152-532be5293024\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.297659 kubelet[2612]: E0517 00:40:58.297553 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7d1186a-bf30-4dec-8152-532be5293024\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" podUID="b7d1186a-bf30-4dec-8152-532be5293024" May 17 00:40:58.307817 env[1739]: time="2025-05-17T00:40:58.307756299Z" level=error msg="StopPodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" failed" error="failed to destroy network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.308526 kubelet[2612]: E0517 00:40:58.308304 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:40:58.308526 kubelet[2612]: E0517 00:40:58.308374 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336"} May 17 00:40:58.308526 kubelet[2612]: E0517 00:40:58.308445 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"942512a4-77b8-4313-9871-7733dbf6b00d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.308526 kubelet[2612]: E0517 00:40:58.308476 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"942512a4-77b8-4313-9871-7733dbf6b00d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-f87869957-bljjj" podUID="942512a4-77b8-4313-9871-7733dbf6b00d" May 17 00:40:58.324612 env[1739]: time="2025-05-17T00:40:58.324555445Z" level=error msg="StopPodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" failed" error="failed to destroy network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.325363 kubelet[2612]: E0517 00:40:58.325156 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:40:58.325363 kubelet[2612]: E0517 00:40:58.325228 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0"} May 17 00:40:58.325363 kubelet[2612]: E0517 00:40:58.325285 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.325363 kubelet[2612]: E0517 00:40:58.325321 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4732e8d0-52d1-4d24-aead-cc04fa7b437f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-q5bk6" podUID="4732e8d0-52d1-4d24-aead-cc04fa7b437f" May 17 00:40:58.347044 env[1739]: time="2025-05-17T00:40:58.346982515Z" level=error msg="StopPodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" failed" error="failed to destroy network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:58.347706 kubelet[2612]: E0517 00:40:58.347425 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:40:58.347706 kubelet[2612]: E0517 00:40:58.347515 2612 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769"} May 17 00:40:58.347706 kubelet[2612]: E0517 00:40:58.347616 2612 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:58.347706 kubelet[2612]: E0517 00:40:58.347652 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6zzbw" podUID="8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287" May 17 00:40:59.316362 kubelet[2612]: I0517 00:40:59.316290 2612 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:40:59.416154 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:40:59.416328 kernel: audit: type=1325 audit(1747442459.412:1035): table=filter:99 family=2 entries=21 op=nft_register_rule pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:59.412000 audit[3976]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:59.450468 kernel: audit: type=1300 audit(1747442459.412:1035): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc07957430 a2=0 a3=7ffc0795741c items=0 ppid=2715 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.450556 kernel: audit: type=1327 audit(1747442459.412:1035): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:59.450590 kernel: audit: type=1325 audit(1747442459.422:1036): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:59.412000 audit[3976]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc07957430 a2=0 a3=7ffc0795741c items=0 ppid=2715 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.461365 kernel: audit: type=1300 audit(1747442459.422:1036): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc07957430 a2=0 a3=7ffc0795741c items=0 ppid=2715 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:59.422000 audit[3976]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:59.422000 audit[3976]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc07957430 a2=0 a3=7ffc0795741c items=0 ppid=2715 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:59.465645 kernel: audit: type=1327 audit(1747442459.422:1036): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:02.707382 amazon-ssm-agent[1784]: 2025-05-17 00:41:02 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:41:05.881178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3308571183.mount: Deactivated successfully. May 17 00:41:05.918536 env[1739]: time="2025-05-17T00:41:05.918470525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:05.921242 env[1739]: time="2025-05-17T00:41:05.921203756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:05.926346 env[1739]: time="2025-05-17T00:41:05.926310223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:05.928387 env[1739]: time="2025-05-17T00:41:05.928335520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:05.928688 env[1739]: time="2025-05-17T00:41:05.928647142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:41:05.976638 env[1739]: time="2025-05-17T00:41:05.976584227Z" level=info msg="CreateContainer within sandbox \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:41:06.002291 env[1739]: time="2025-05-17T00:41:06.002238499Z" level=info msg="CreateContainer within sandbox \"f327c2bf45dc95d9198e04ff445570bf1df48cfaf1e098f4291c6cbd800d32ed\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f\"" May 17 00:41:06.032273 env[1739]: time="2025-05-17T00:41:06.003475086Z" level=info msg="StartContainer for \"deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f\"" May 17 00:41:06.034016 systemd[1]: Started cri-containerd-deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f.scope. May 17 00:41:06.068000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.076541 kernel: audit: type=1400 audit(1747442466.068:1037): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.076645 kernel: audit: type=1300 audit(1747442466.068:1037): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ccc19eb58 items=0 ppid=3350 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.068000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ccc19eb58 items=0 ppid=3350 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.090172 kernel: audit: type=1327 audit(1747442466.068:1037): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656433646534356533346438383231343438396431303036626236 May 17 00:41:06.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656433646534356533346438383231343438396431303036626236 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.100391 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.100516 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.111095 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.117196 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.130419 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.130555 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.137170 kernel: audit: type=1400 audit(1747442466.068:1038): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.068000 audit: BPF prog-id=142 op=LOAD May 17 00:41:06.068000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034ba18 items=0 ppid=3350 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656433646534356533346438383231343438396431303036626236 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit: BPF prog-id=143 op=LOAD May 17 00:41:06.075000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034ba68 items=0 ppid=3350 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656433646534356533346438383231343438396431303036626236 May 17 00:41:06.075000 audit: BPF prog-id=143 op=UNLOAD May 17 00:41:06.075000 audit: BPF prog-id=142 op=UNLOAD May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.075000 audit: BPF prog-id=144 op=LOAD May 17 00:41:06.075000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034baf8 items=0 ppid=3350 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656433646534356533346438383231343438396431303036626236 May 17 00:41:06.154304 env[1739]: time="2025-05-17T00:41:06.154232122Z" level=info msg="StartContainer for \"deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f\" returns successfully" May 17 00:41:06.765337 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:41:06.766690 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:41:07.228013 systemd[1]: run-containerd-runc-k8s.io-deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f-runc.xF8aWg.mount: Deactivated successfully. May 17 00:41:07.712955 kubelet[2612]: I0517 00:41:07.709515 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rmfqz" podStartSLOduration=2.83384571 podStartE2EDuration="23.709461805s" podCreationTimestamp="2025-05-17 00:40:44 +0000 UTC" firstStartedPulling="2025-05-17 00:40:45.054652239 +0000 UTC m=+20.476957103" lastFinishedPulling="2025-05-17 00:41:05.930268334 +0000 UTC m=+41.352573198" observedRunningTime="2025-05-17 00:41:06.226651714 +0000 UTC m=+41.648956588" watchObservedRunningTime="2025-05-17 00:41:07.709461805 +0000 UTC m=+43.131766679" May 17 00:41:07.716867 env[1739]: time="2025-05-17T00:41:07.716823695Z" level=info msg="StopPodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\"" May 17 00:41:08.200000 audit[4152]: AVC avc: denied { write } for pid=4152 comm="tee" name="fd" dev="proc" ino=25789 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.200000 audit[4152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8ed1c7d4 a2=241 a3=1b6 items=1 ppid=4126 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.200000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:41:08.200000 audit: PATH item=0 name="/dev/fd/63" inode=25784 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.200000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.201000 audit[4154]: AVC avc: denied { write } for pid=4154 comm="tee" name="fd" dev="proc" ino=25793 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.201000 audit[4154]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9b80e7e4 a2=241 a3=1b6 items=1 ppid=4128 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.201000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:41:08.201000 audit: PATH item=0 name="/dev/fd/63" inode=25785 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.201000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.222000 audit[4149]: AVC avc: denied { write } for pid=4149 comm="tee" name="fd" dev="proc" ino=25808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.225000 audit[4162]: AVC avc: denied { write } for pid=4162 comm="tee" name="fd" dev="proc" ino=26748 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:07.833 [INFO][4101] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:07.835 [INFO][4101] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" iface="eth0" netns="/var/run/netns/cni-3bd2f162-6f17-f9de-c431-9d0b5feea167" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:07.835 [INFO][4101] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" iface="eth0" netns="/var/run/netns/cni-3bd2f162-6f17-f9de-c431-9d0b5feea167" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:07.836 [INFO][4101] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" iface="eth0" netns="/var/run/netns/cni-3bd2f162-6f17-f9de-c431-9d0b5feea167" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:07.836 [INFO][4101] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:07.836 [INFO][4101] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.190 [INFO][4108] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.194 [INFO][4108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.194 [INFO][4108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.223 [WARNING][4108] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.224 [INFO][4108] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.226 [INFO][4108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:08.230794 env[1739]: 2025-05-17 00:41:08.228 [INFO][4101] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:08.233734 systemd[1]: run-netns-cni\x2d3bd2f162\x2d6f17\x2df9de\x2dc431\x2d9d0b5feea167.mount: Deactivated successfully. May 17 00:41:08.222000 audit[4149]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcacb037e5 a2=241 a3=1b6 items=1 ppid=4122 pid=4149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.222000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:41:08.222000 audit: PATH item=0 name="/dev/fd/63" inode=25781 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.222000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.235834 env[1739]: time="2025-05-17T00:41:08.235052037Z" level=info msg="TearDown network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" successfully" May 17 00:41:08.235834 env[1739]: time="2025-05-17T00:41:08.235099288Z" level=info msg="StopPodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" returns successfully" May 17 00:41:08.225000 audit[4162]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2afee7d3 a2=241 a3=1b6 items=1 ppid=4134 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.225000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:41:08.225000 audit: PATH item=0 name="/dev/fd/63" inode=25805 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.225000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.245000 audit[4175]: AVC avc: denied { write } for pid=4175 comm="tee" name="fd" dev="proc" ino=26762 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.245000 audit[4175]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddeaa57e3 a2=241 a3=1b6 items=1 ppid=4124 pid=4175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.245000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:41:08.245000 audit: PATH item=0 name="/dev/fd/63" inode=26758 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.245000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.255000 audit[4177]: AVC avc: denied { write } for pid=4177 comm="tee" name="fd" dev="proc" ino=26766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.255000 audit[4177]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9b8b47e3 a2=241 a3=1b6 items=1 ppid=4132 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.255000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:41:08.255000 audit: PATH item=0 name="/dev/fd/63" inode=25818 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.255000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.262000 audit[4190]: AVC avc: denied { write } for pid=4190 comm="tee" name="fd" dev="proc" ino=26773 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:08.262000 audit[4190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf39327e3 a2=241 a3=1b6 items=1 ppid=4130 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.262000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:41:08.262000 audit: PATH item=0 name="/dev/fd/63" inode=26769 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:08.262000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:08.382002 kubelet[2612]: I0517 00:41:08.381958 2612 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-backend-key-pair\") pod \"942512a4-77b8-4313-9871-7733dbf6b00d\" (UID: \"942512a4-77b8-4313-9871-7733dbf6b00d\") " May 17 00:41:08.382532 kubelet[2612]: I0517 00:41:08.382505 2612 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-l5d95\" (UniqueName: \"kubernetes.io/projected/942512a4-77b8-4313-9871-7733dbf6b00d-kube-api-access-l5d95\") pod \"942512a4-77b8-4313-9871-7733dbf6b00d\" (UID: \"942512a4-77b8-4313-9871-7733dbf6b00d\") " May 17 00:41:08.385452 kubelet[2612]: I0517 00:41:08.385417 2612 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-ca-bundle\") pod \"942512a4-77b8-4313-9871-7733dbf6b00d\" (UID: \"942512a4-77b8-4313-9871-7733dbf6b00d\") " May 17 00:41:08.387704 kubelet[2612]: I0517 00:41:08.387649 2612 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "942512a4-77b8-4313-9871-7733dbf6b00d" (UID: "942512a4-77b8-4313-9871-7733dbf6b00d"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:41:08.399019 systemd[1]: var-lib-kubelet-pods-942512a4\x2d77b8\x2d4313\x2d9871\x2d7733dbf6b00d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dl5d95.mount: Deactivated successfully. May 17 00:41:08.401316 kubelet[2612]: I0517 00:41:08.399741 2612 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/942512a4-77b8-4313-9871-7733dbf6b00d-kube-api-access-l5d95" (OuterVolumeSpecName: "kube-api-access-l5d95") pod "942512a4-77b8-4313-9871-7733dbf6b00d" (UID: "942512a4-77b8-4313-9871-7733dbf6b00d"). InnerVolumeSpecName "kube-api-access-l5d95". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:41:08.405194 systemd[1]: var-lib-kubelet-pods-942512a4\x2d77b8\x2d4313\x2d9871\x2d7733dbf6b00d-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:41:08.407312 kubelet[2612]: I0517 00:41:08.407267 2612 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "942512a4-77b8-4313-9871-7733dbf6b00d" (UID: "942512a4-77b8-4313-9871-7733dbf6b00d"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:41:08.487975 kubelet[2612]: I0517 00:41:08.487852 2612 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-backend-key-pair\") on node \"ip-172-31-25-158\" DevicePath \"\"" May 17 00:41:08.487975 kubelet[2612]: I0517 00:41:08.487922 2612 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-l5d95\" (UniqueName: \"kubernetes.io/projected/942512a4-77b8-4313-9871-7733dbf6b00d-kube-api-access-l5d95\") on node \"ip-172-31-25-158\" DevicePath \"\"" May 17 00:41:08.487975 kubelet[2612]: I0517 00:41:08.487942 2612 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/942512a4-77b8-4313-9871-7733dbf6b00d-whisker-ca-bundle\") on node \"ip-172-31-25-158\" DevicePath \"\"" May 17 00:41:08.652000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.652000 audit: BPF prog-id=145 op=LOAD May 17 00:41:08.652000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec1da5c80 a2=98 a3=3 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.652000 audit: BPF prog-id=145 op=UNLOAD May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit: BPF prog-id=146 op=LOAD May 17 00:41:08.654000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec1da5a70 a2=94 a3=54428f items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.654000 audit: BPF prog-id=146 op=UNLOAD May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.654000 audit: BPF prog-id=147 op=LOAD May 17 00:41:08.654000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec1da5aa0 a2=94 a3=2 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.654000 audit: BPF prog-id=147 op=UNLOAD May 17 00:41:08.835000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit: BPF prog-id=148 op=LOAD May 17 00:41:08.835000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec1da5960 a2=94 a3=1 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.835000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.835000 audit: BPF prog-id=148 op=UNLOAD May 17 00:41:08.835000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.835000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec1da5a30 a2=50 a3=7ffec1da5b10 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.835000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1da5970 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1da59a0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1da58b0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1da59c0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1da59a0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1da5990 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1da59c0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1da59a0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1da59c0 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1da5990 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.846000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.846000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1da5a00 a2=28 a3=0 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec1da57b0 a2=50 a3=1 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit: BPF prog-id=149 op=LOAD May 17 00:41:08.847000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec1da57b0 a2=94 a3=5 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.847000 audit: BPF prog-id=149 op=UNLOAD May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec1da5860 a2=50 a3=1 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec1da5980 a2=4 a3=38 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { confidentiality } for pid=4213 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:08.847000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec1da59d0 a2=94 a3=6 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.847000 audit[4213]: AVC avc: denied { confidentiality } for pid=4213 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:08.847000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec1da5180 a2=94 a3=88 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.848000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.848000 audit[4213]: AVC avc: denied { confidentiality } for pid=4213 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:08.848000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec1da5180 a2=94 a3=88 items=0 ppid=4133 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit: BPF prog-id=150 op=LOAD May 17 00:41:08.860000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8b7ccc30 a2=98 a3=1999999999999999 items=0 ppid=4133 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.860000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:08.860000 audit: BPF prog-id=150 op=UNLOAD May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit: BPF prog-id=151 op=LOAD May 17 00:41:08.860000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8b7ccb10 a2=94 a3=ffff items=0 ppid=4133 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.860000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:08.860000 audit: BPF prog-id=151 op=UNLOAD May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:08.860000 audit: BPF prog-id=152 op=LOAD May 17 00:41:08.860000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8b7ccb50 a2=94 a3=7ffd8b7ccd30 items=0 ppid=4133 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.860000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:08.860000 audit: BPF prog-id=152 op=UNLOAD May 17 00:41:08.892282 env[1739]: time="2025-05-17T00:41:08.892234924Z" level=info msg="StopPodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\"" May 17 00:41:08.917731 systemd[1]: Removed slice kubepods-besteffort-pod942512a4_77b8_4313_9871_7733dbf6b00d.slice. May 17 00:41:08.987392 (udev-worker)[4048]: Network interface NamePolicy= disabled on kernel command line. May 17 00:41:08.995681 systemd-networkd[1462]: vxlan.calico: Link UP May 17 00:41:08.995698 systemd-networkd[1462]: vxlan.calico: Gained carrier May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.001 [INFO][4255] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.001 [INFO][4255] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" iface="eth0" netns="/var/run/netns/cni-420ca775-cc67-1f45-abdb-c9361a81e05f" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.002 [INFO][4255] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" iface="eth0" netns="/var/run/netns/cni-420ca775-cc67-1f45-abdb-c9361a81e05f" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.002 [INFO][4255] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" iface="eth0" netns="/var/run/netns/cni-420ca775-cc67-1f45-abdb-c9361a81e05f" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.002 [INFO][4255] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.002 [INFO][4255] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.054 [INFO][4267] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.054 [INFO][4267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.055 [INFO][4267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.063 [WARNING][4267] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.063 [INFO][4267] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.066 [INFO][4267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:09.073486 env[1739]: 2025-05-17 00:41:09.069 [INFO][4255] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:09.077718 systemd[1]: run-netns-cni\x2d420ca775\x2dcc67\x2d1f45\x2dabdb\x2dc9361a81e05f.mount: Deactivated successfully. May 17 00:41:09.080419 env[1739]: time="2025-05-17T00:41:09.080367315Z" level=info msg="TearDown network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" successfully" May 17 00:41:09.080545 env[1739]: time="2025-05-17T00:41:09.080524011Z" level=info msg="StopPodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" returns successfully" May 17 00:41:09.081483 env[1739]: time="2025-05-17T00:41:09.081445262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vpk7m,Uid:bdc4c222-6e91-430d-bb4e-7e63d4524888,Namespace:calico-system,Attempt:1,}" May 17 00:41:09.084772 (udev-worker)[4047]: Network interface NamePolicy= disabled on kernel command line. May 17 00:41:09.112000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.112000 audit: BPF prog-id=153 op=LOAD May 17 00:41:09.112000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8d6b6580 a2=98 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.115000 audit: BPF prog-id=153 op=UNLOAD May 17 00:41:09.115000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.115000 audit: BPF prog-id=154 op=LOAD May 17 00:41:09.115000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8d6b6390 a2=94 a3=54428f items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.115000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit: BPF prog-id=154 op=UNLOAD May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit: BPF prog-id=155 op=LOAD May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8d6b63c0 a2=94 a3=2 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit: BPF prog-id=155 op=UNLOAD May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8d6b6290 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8d6b62c0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8d6b61d0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8d6b62e0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8d6b62c0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8d6b62b0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8d6b62e0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8d6b62c0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8d6b62e0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8d6b62b0 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8d6b6320 a2=28 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.116000 audit: BPF prog-id=156 op=LOAD May 17 00:41:09.116000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8d6b6190 a2=94 a3=0 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.116000 audit: BPF prog-id=156 op=UNLOAD May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc8d6b6180 a2=50 a3=2800 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc8d6b6180 a2=50 a3=2800 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit: BPF prog-id=157 op=LOAD May 17 00:41:09.117000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8d6b59a0 a2=94 a3=2 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.117000 audit: BPF prog-id=157 op=UNLOAD May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.117000 audit: BPF prog-id=158 op=LOAD May 17 00:41:09.117000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8d6b5aa0 a2=94 a3=30 items=0 ppid=4133 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.126000 audit: BPF prog-id=159 op=LOAD May 17 00:41:09.126000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffc261a5a0 a2=98 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.126000 audit: BPF prog-id=159 op=UNLOAD May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit: BPF prog-id=160 op=LOAD May 17 00:41:09.128000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc261a390 a2=94 a3=54428f items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.128000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.128000 audit: BPF prog-id=160 op=UNLOAD May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.128000 audit: BPF prog-id=161 op=LOAD May 17 00:41:09.128000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc261a3c0 a2=94 a3=2 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.128000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.128000 audit: BPF prog-id=161 op=UNLOAD May 17 00:41:09.358192 systemd-networkd[1462]: cali0e9ba9848c5: Link UP May 17 00:41:09.360675 systemd-networkd[1462]: cali0e9ba9848c5: Gained carrier May 17 00:41:09.361228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0e9ba9848c5: link becomes ready May 17 00:41:09.377000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit: BPF prog-id=162 op=LOAD May 17 00:41:09.377000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc261a280 a2=94 a3=1 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.377000 audit: BPF prog-id=162 op=UNLOAD May 17 00:41:09.377000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.377000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffc261a350 a2=50 a3=7fffc261a430 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.184 [INFO][4290] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0 goldmane-78d55f7ddc- calico-system bdc4c222-6e91-430d-bb4e-7e63d4524888 911 0 2025-05-17 00:40:43 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ip-172-31-25-158 goldmane-78d55f7ddc-vpk7m eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali0e9ba9848c5 [] [] }} ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.184 [INFO][4290] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.263 [INFO][4304] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" HandleID="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.264 [INFO][4304] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" HandleID="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-158", "pod":"goldmane-78d55f7ddc-vpk7m", "timestamp":"2025-05-17 00:41:09.263723399 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.264 [INFO][4304] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.264 [INFO][4304] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.264 [INFO][4304] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.275 [INFO][4304] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.290 [INFO][4304] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.310 [INFO][4304] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.315 [INFO][4304] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.318 [INFO][4304] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.318 [INFO][4304] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.320 [INFO][4304] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.326 [INFO][4304] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.337 [INFO][4304] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.129/26] block=192.168.111.128/26 handle="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.337 [INFO][4304] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.129/26] handle="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" host="ip-172-31-25-158" May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.337 [INFO][4304] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:09.390438 env[1739]: 2025-05-17 00:41:09.337 [INFO][4304] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.129/26] IPv6=[] ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" HandleID="k8s-pod-network.887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.391489 env[1739]: 2025-05-17 00:41:09.339 [INFO][4290] cni-plugin/k8s.go 418: Populated endpoint ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"bdc4c222-6e91-430d-bb4e-7e63d4524888", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"goldmane-78d55f7ddc-vpk7m", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0e9ba9848c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:09.391489 env[1739]: 2025-05-17 00:41:09.340 [INFO][4290] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.129/32] ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.391489 env[1739]: 2025-05-17 00:41:09.340 [INFO][4290] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0e9ba9848c5 ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.391489 env[1739]: 2025-05-17 00:41:09.363 [INFO][4290] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.391489 env[1739]: 2025-05-17 00:41:09.363 [INFO][4290] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"bdc4c222-6e91-430d-bb4e-7e63d4524888", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb", Pod:"goldmane-78d55f7ddc-vpk7m", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0e9ba9848c5", MAC:"ae:8b:6c:ed:7c:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:09.391489 env[1739]: 2025-05-17 00:41:09.387 [INFO][4290] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vpk7m" WorkloadEndpoint="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:09.404000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.404000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc261a290 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.404000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc261a2c0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc261a1d0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc261a2e0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc261a2c0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc261a2b0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc261a2e0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc261a2c0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc261a2e0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc261a2b0 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.406000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.406000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc261a320 a2=28 a3=0 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc261a0d0 a2=50 a3=1 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.409000 audit: BPF prog-id=163 op=LOAD May 17 00:41:09.413675 env[1739]: time="2025-05-17T00:41:09.413581785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:09.413860 env[1739]: time="2025-05-17T00:41:09.413830191Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:09.413999 env[1739]: time="2025-05-17T00:41:09.413970228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:09.409000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffc261a0d0 a2=94 a3=5 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.414578 env[1739]: time="2025-05-17T00:41:09.414537516Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb pid=4324 runtime=io.containerd.runc.v2 May 17 00:41:09.420000 audit: BPF prog-id=163 op=UNLOAD May 17 00:41:09.420000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.420000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc261a180 a2=50 a3=1 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffc261a2a0 a2=4 a3=38 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.423000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.423000 audit[4295]: AVC avc: denied { confidentiality } for pid=4295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:09.423000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc261a2f0 a2=94 a3=6 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.423000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.435000 audit[4295]: AVC avc: denied { confidentiality } for pid=4295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:09.435000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc2619aa0 a2=94 a3=88 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.442000 audit[4295]: AVC avc: denied { confidentiality } for pid=4295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:09.442000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc2619aa0 a2=94 a3=88 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.464694 systemd[1]: run-containerd-runc-k8s.io-887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb-runc.DUneiM.mount: Deactivated successfully. May 17 00:41:09.472866 systemd[1]: Started cri-containerd-887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb.scope. May 17 00:41:09.473000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.473000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc261b4d0 a2=10 a3=f8f00800 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.474000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.474000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc261b370 a2=10 a3=3 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.474000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.474000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc261b310 a2=10 a3=3 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.474000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.474000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc261b310 a2=10 a3=7 items=0 ppid=4133 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:09.482000 audit: BPF prog-id=158 op=UNLOAD May 17 00:41:09.525742 systemd[1]: Created slice kubepods-besteffort-pod46fff1a5_2bcc_4999_b953_02ef302ea2d4.slice. May 17 00:41:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.582000 audit: BPF prog-id=164 op=LOAD May 17 00:41:09.583000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.583000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838376562616662353432316630343038303563613962613135363437 May 17 00:41:09.583000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.583000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838376562616662353432316630343038303563613962613135363437 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.585000 audit: BPF prog-id=165 op=LOAD May 17 00:41:09.585000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000289a30 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838376562616662353432316630343038303563613962613135363437 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit: BPF prog-id=166 op=LOAD May 17 00:41:09.586000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000289a78 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838376562616662353432316630343038303563613962613135363437 May 17 00:41:09.586000 audit: BPF prog-id=166 op=UNLOAD May 17 00:41:09.586000 audit: BPF prog-id=165 op=UNLOAD May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.586000 audit: BPF prog-id=167 op=LOAD May 17 00:41:09.586000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000289e88 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838376562616662353432316630343038303563613962613135363437 May 17 00:41:09.606654 kubelet[2612]: I0517 00:41:09.606617 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5c52g\" (UniqueName: \"kubernetes.io/projected/46fff1a5-2bcc-4999-b953-02ef302ea2d4-kube-api-access-5c52g\") pod \"whisker-5cd8f45bdf-lrhbq\" (UID: \"46fff1a5-2bcc-4999-b953-02ef302ea2d4\") " pod="calico-system/whisker-5cd8f45bdf-lrhbq" May 17 00:41:09.607224 kubelet[2612]: I0517 00:41:09.607196 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/46fff1a5-2bcc-4999-b953-02ef302ea2d4-whisker-backend-key-pair\") pod \"whisker-5cd8f45bdf-lrhbq\" (UID: \"46fff1a5-2bcc-4999-b953-02ef302ea2d4\") " pod="calico-system/whisker-5cd8f45bdf-lrhbq" May 17 00:41:09.607370 kubelet[2612]: I0517 00:41:09.607353 2612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/46fff1a5-2bcc-4999-b953-02ef302ea2d4-whisker-ca-bundle\") pod \"whisker-5cd8f45bdf-lrhbq\" (UID: \"46fff1a5-2bcc-4999-b953-02ef302ea2d4\") " pod="calico-system/whisker-5cd8f45bdf-lrhbq" May 17 00:41:09.652150 env[1739]: time="2025-05-17T00:41:09.651991855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vpk7m,Uid:bdc4c222-6e91-430d-bb4e-7e63d4524888,Namespace:calico-system,Attempt:1,} returns sandbox id \"887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb\"" May 17 00:41:09.664713 env[1739]: time="2025-05-17T00:41:09.664673624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:41:09.682000 audit[4380]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:09.682000 audit[4380]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd55f8e870 a2=0 a3=7ffd55f8e85c items=0 ppid=4133 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.682000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:09.698000 audit[4379]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=4379 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:09.698000 audit[4379]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffed8a34bc0 a2=0 a3=7ffed8a34bac items=0 ppid=4133 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.698000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:09.704000 audit[4381]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=4381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:09.704000 audit[4381]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffedccdfee0 a2=0 a3=7ffedccdfecc items=0 ppid=4133 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.704000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:09.706000 audit[4384]: NETFILTER_CFG table=filter:104 family=2 entries=39 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:09.706000 audit[4384]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffff8bc1170 a2=0 a3=7ffff8bc115c items=0 ppid=4133 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:09.748000 audit[4392]: NETFILTER_CFG table=filter:105 family=2 entries=46 op=nft_register_chain pid=4392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:09.748000 audit[4392]: SYSCALL arch=c000003e syscall=46 success=yes exit=26968 a0=3 a1=7ffd3b66f1d0 a2=0 a3=7ffd3b66f1bc items=0 ppid=4133 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:09.748000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:09.826661 env[1739]: time="2025-05-17T00:41:09.826593111Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:09.827750 env[1739]: time="2025-05-17T00:41:09.827699539Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:09.828067 kubelet[2612]: E0517 00:41:09.827927 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:09.828067 kubelet[2612]: E0517 00:41:09.828009 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:09.832575 kubelet[2612]: E0517 00:41:09.832493 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-j9lf9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vpk7m_calico-system(bdc4c222-6e91-430d-bb4e-7e63d4524888): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:09.834674 kubelet[2612]: E0517 00:41:09.834634 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:41:09.836853 env[1739]: time="2025-05-17T00:41:09.836816840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5cd8f45bdf-lrhbq,Uid:46fff1a5-2bcc-4999-b953-02ef302ea2d4,Namespace:calico-system,Attempt:0,}" May 17 00:41:09.892482 env[1739]: time="2025-05-17T00:41:09.892449303Z" level=info msg="StopPodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\"" May 17 00:41:09.893416 env[1739]: time="2025-05-17T00:41:09.892997708Z" level=info msg="StopPodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\"" May 17 00:41:10.064773 systemd-networkd[1462]: calif378826d3f6: Link UP May 17 00:41:10.068670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif378826d3f6: link becomes ready May 17 00:41:10.068396 systemd-networkd[1462]: calif378826d3f6: Gained carrier May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.890 [INFO][4398] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0 whisker-5cd8f45bdf- calico-system 46fff1a5-2bcc-4999-b953-02ef302ea2d4 927 0 2025-05-17 00:41:09 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:5cd8f45bdf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ip-172-31-25-158 whisker-5cd8f45bdf-lrhbq eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calif378826d3f6 [] [] }} ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.891 [INFO][4398] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.972 [INFO][4427] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" HandleID="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Workload="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.973 [INFO][4427] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" HandleID="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Workload="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033a0d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-158", "pod":"whisker-5cd8f45bdf-lrhbq", "timestamp":"2025-05-17 00:41:09.972661757 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.973 [INFO][4427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.974 [INFO][4427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.974 [INFO][4427] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:09.987 [INFO][4427] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.003 [INFO][4427] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.016 [INFO][4427] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.026 [INFO][4427] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.031 [INFO][4427] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.032 [INFO][4427] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.034 [INFO][4427] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7 May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.044 [INFO][4427] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.057 [INFO][4427] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.130/26] block=192.168.111.128/26 handle="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.057 [INFO][4427] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.130/26] handle="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" host="ip-172-31-25-158" May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.057 [INFO][4427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:10.090529 env[1739]: 2025-05-17 00:41:10.057 [INFO][4427] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.130/26] IPv6=[] ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" HandleID="k8s-pod-network.cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Workload="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.092080 env[1739]: 2025-05-17 00:41:10.060 [INFO][4398] cni-plugin/k8s.go 418: Populated endpoint ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0", GenerateName:"whisker-5cd8f45bdf-", Namespace:"calico-system", SelfLink:"", UID:"46fff1a5-2bcc-4999-b953-02ef302ea2d4", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5cd8f45bdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"whisker-5cd8f45bdf-lrhbq", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.111.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calif378826d3f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:10.092080 env[1739]: 2025-05-17 00:41:10.060 [INFO][4398] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.130/32] ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.092080 env[1739]: 2025-05-17 00:41:10.060 [INFO][4398] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif378826d3f6 ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.092080 env[1739]: 2025-05-17 00:41:10.069 [INFO][4398] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.092080 env[1739]: 2025-05-17 00:41:10.070 [INFO][4398] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0", GenerateName:"whisker-5cd8f45bdf-", Namespace:"calico-system", SelfLink:"", UID:"46fff1a5-2bcc-4999-b953-02ef302ea2d4", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5cd8f45bdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7", Pod:"whisker-5cd8f45bdf-lrhbq", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.111.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calif378826d3f6", MAC:"f2:f7:2a:0d:ef:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:10.092080 env[1739]: 2025-05-17 00:41:10.086 [INFO][4398] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7" Namespace="calico-system" Pod="whisker-5cd8f45bdf-lrhbq" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--5cd8f45bdf--lrhbq-eth0" May 17 00:41:10.132000 audit[4474]: NETFILTER_CFG table=filter:106 family=2 entries=57 op=nft_register_chain pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:10.132000 audit[4474]: SYSCALL arch=c000003e syscall=46 success=yes exit=34072 a0=3 a1=7ffe5c2e3370 a2=0 a3=7ffe5c2e335c items=0 ppid=4133 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.132000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:09.981 [INFO][4429] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:09.982 [INFO][4429] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" iface="eth0" netns="/var/run/netns/cni-52276653-08f2-4d39-979f-a5fc0ab7ebc0" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:09.982 [INFO][4429] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" iface="eth0" netns="/var/run/netns/cni-52276653-08f2-4d39-979f-a5fc0ab7ebc0" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:09.982 [INFO][4429] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" iface="eth0" netns="/var/run/netns/cni-52276653-08f2-4d39-979f-a5fc0ab7ebc0" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:09.982 [INFO][4429] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:09.982 [INFO][4429] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.101 [INFO][4449] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.104 [INFO][4449] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.104 [INFO][4449] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.125 [WARNING][4449] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.125 [INFO][4449] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.129 [INFO][4449] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:10.144646 env[1739]: 2025-05-17 00:41:10.142 [INFO][4429] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:10.145320 env[1739]: time="2025-05-17T00:41:10.145281401Z" level=info msg="TearDown network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" successfully" May 17 00:41:10.145416 env[1739]: time="2025-05-17T00:41:10.145400274Z" level=info msg="StopPodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" returns successfully" May 17 00:41:10.146363 env[1739]: time="2025-05-17T00:41:10.146326821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-ncxj8,Uid:b7d1186a-bf30-4dec-8152-532be5293024,Namespace:calico-apiserver,Attempt:1,}" May 17 00:41:10.152614 env[1739]: time="2025-05-17T00:41:10.152509996Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:10.152768 env[1739]: time="2025-05-17T00:41:10.152649607Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:10.152768 env[1739]: time="2025-05-17T00:41:10.152682129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:10.153184 env[1739]: time="2025-05-17T00:41:10.153073436Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7 pid=4482 runtime=io.containerd.runc.v2 May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.052 [INFO][4442] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.052 [INFO][4442] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" iface="eth0" netns="/var/run/netns/cni-4ff4a966-5743-2a25-bf7e-e4b66e86f589" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.053 [INFO][4442] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" iface="eth0" netns="/var/run/netns/cni-4ff4a966-5743-2a25-bf7e-e4b66e86f589" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.053 [INFO][4442] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" iface="eth0" netns="/var/run/netns/cni-4ff4a966-5743-2a25-bf7e-e4b66e86f589" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.053 [INFO][4442] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.053 [INFO][4442] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.156 [INFO][4457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.157 [INFO][4457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.157 [INFO][4457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.166 [WARNING][4457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.166 [INFO][4457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.168 [INFO][4457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:10.174570 env[1739]: 2025-05-17 00:41:10.171 [INFO][4442] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:10.175730 env[1739]: time="2025-05-17T00:41:10.175687668Z" level=info msg="TearDown network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" successfully" May 17 00:41:10.175871 env[1739]: time="2025-05-17T00:41:10.175844906Z" level=info msg="StopPodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" returns successfully" May 17 00:41:10.182668 systemd[1]: Started cri-containerd-cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7.scope. May 17 00:41:10.184511 env[1739]: time="2025-05-17T00:41:10.184460219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-577d59dd8d-5cp45,Uid:0106ba82-539e-49ae-85cf-21d470967512,Namespace:calico-system,Attempt:1,}" May 17 00:41:10.213294 systemd-networkd[1462]: vxlan.calico: Gained IPv6LL May 17 00:41:10.216716 kubelet[2612]: E0517 00:41:10.216465 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:41:10.248173 systemd[1]: run-netns-cni\x2d4ff4a966\x2d5743\x2d2a25\x2dbf7e\x2de4b66e86f589.mount: Deactivated successfully. May 17 00:41:10.248307 systemd[1]: run-netns-cni\x2d52276653\x2d08f2\x2d4d39\x2d979f\x2da5fc0ab7ebc0.mount: Deactivated successfully. May 17 00:41:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.276000 audit: BPF prog-id=168 op=LOAD May 17 00:41:10.277000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.277000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4482 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663661613337386163396232323332346261303839343661356232 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4482 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663661613337386163396232323332346261303839343661356232 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.278000 audit: BPF prog-id=169 op=LOAD May 17 00:41:10.278000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020fbf0 items=0 ppid=4482 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663661613337386163396232323332346261303839343661356232 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.279000 audit: BPF prog-id=170 op=LOAD May 17 00:41:10.279000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020fc38 items=0 ppid=4482 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663661613337386163396232323332346261303839343661356232 May 17 00:41:10.280000 audit: BPF prog-id=170 op=UNLOAD May 17 00:41:10.280000 audit: BPF prog-id=169 op=UNLOAD May 17 00:41:10.280000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.280000 audit: BPF prog-id=171 op=LOAD May 17 00:41:10.280000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00040c048 items=0 ppid=4482 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663661613337386163396232323332346261303839343661356232 May 17 00:41:10.327000 audit[4535]: NETFILTER_CFG table=filter:107 family=2 entries=20 op=nft_register_rule pid=4535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:10.327000 audit[4535]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe9d72c110 a2=0 a3=7ffe9d72c0fc items=0 ppid=2715 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:10.333000 audit[4535]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:10.333000 audit[4535]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe9d72c110 a2=0 a3=0 items=0 ppid=2715 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:10.384281 env[1739]: time="2025-05-17T00:41:10.384232500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5cd8f45bdf-lrhbq,Uid:46fff1a5-2bcc-4999-b953-02ef302ea2d4,Namespace:calico-system,Attempt:0,} returns sandbox id \"cef6aa378ac9b22324ba08946a5b262f9af6959e412beb75eb612d8a07382bb7\"" May 17 00:41:10.386571 env[1739]: time="2025-05-17T00:41:10.386531653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:41:10.479835 systemd-networkd[1462]: cali8c938fbd1a4: Link UP May 17 00:41:10.484779 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:10.484869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8c938fbd1a4: link becomes ready May 17 00:41:10.485027 systemd-networkd[1462]: cali8c938fbd1a4: Gained carrier May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.291 [INFO][4500] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0 calico-apiserver-6b4b9bd5c8- calico-apiserver b7d1186a-bf30-4dec-8152-532be5293024 936 0 2025-05-17 00:40:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b4b9bd5c8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-25-158 calico-apiserver-6b4b9bd5c8-ncxj8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8c938fbd1a4 [] [] }} ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.291 [INFO][4500] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.399 [INFO][4531] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" HandleID="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.399 [INFO][4531] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" HandleID="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f670), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-25-158", "pod":"calico-apiserver-6b4b9bd5c8-ncxj8", "timestamp":"2025-05-17 00:41:10.399654652 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.400 [INFO][4531] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.400 [INFO][4531] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.400 [INFO][4531] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.410 [INFO][4531] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.420 [INFO][4531] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.428 [INFO][4531] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.431 [INFO][4531] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.434 [INFO][4531] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.435 [INFO][4531] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.437 [INFO][4531] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209 May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.446 [INFO][4531] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.468 [INFO][4531] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.131/26] block=192.168.111.128/26 handle="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.468 [INFO][4531] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.131/26] handle="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" host="ip-172-31-25-158" May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.468 [INFO][4531] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:10.537991 env[1739]: 2025-05-17 00:41:10.468 [INFO][4531] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.131/26] IPv6=[] ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" HandleID="k8s-pod-network.30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.538979 env[1739]: 2025-05-17 00:41:10.470 [INFO][4500] cni-plugin/k8s.go 418: Populated endpoint ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"b7d1186a-bf30-4dec-8152-532be5293024", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"calico-apiserver-6b4b9bd5c8-ncxj8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8c938fbd1a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:10.538979 env[1739]: 2025-05-17 00:41:10.470 [INFO][4500] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.131/32] ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.538979 env[1739]: 2025-05-17 00:41:10.470 [INFO][4500] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8c938fbd1a4 ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.538979 env[1739]: 2025-05-17 00:41:10.485 [INFO][4500] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.538979 env[1739]: 2025-05-17 00:41:10.486 [INFO][4500] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"b7d1186a-bf30-4dec-8152-532be5293024", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209", Pod:"calico-apiserver-6b4b9bd5c8-ncxj8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8c938fbd1a4", MAC:"b6:02:ac:17:8b:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:10.538979 env[1739]: 2025-05-17 00:41:10.535 [INFO][4500] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-ncxj8" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:10.557245 env[1739]: time="2025-05-17T00:41:10.557186021Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:10.559278 env[1739]: time="2025-05-17T00:41:10.559226575Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:10.561440 kubelet[2612]: E0517 00:41:10.561334 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:10.561440 kubelet[2612]: E0517 00:41:10.561406 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:10.561640 kubelet[2612]: E0517 00:41:10.561569 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:56dc55be560a4f65a779449400a59c49,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:10.564071 env[1739]: time="2025-05-17T00:41:10.564034959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:41:10.567579 env[1739]: time="2025-05-17T00:41:10.567488917Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:10.567702 env[1739]: time="2025-05-17T00:41:10.567602076Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:10.567702 env[1739]: time="2025-05-17T00:41:10.567636228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:10.567854 env[1739]: time="2025-05-17T00:41:10.567821438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209 pid=4571 runtime=io.containerd.runc.v2 May 17 00:41:10.647569 systemd[1]: run-containerd-runc-k8s.io-30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209-runc.auHqqZ.mount: Deactivated successfully. May 17 00:41:10.654315 systemd[1]: Started cri-containerd-30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209.scope. May 17 00:41:10.683179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali31c15d4cea7: link becomes ready May 17 00:41:10.682927 systemd-networkd[1462]: cali31c15d4cea7: Link UP May 17 00:41:10.683632 systemd-networkd[1462]: cali31c15d4cea7: Gained carrier May 17 00:41:10.747000 audit[4603]: NETFILTER_CFG table=filter:109 family=2 entries=54 op=nft_register_chain pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:10.747000 audit[4603]: SYSCALL arch=c000003e syscall=46 success=yes exit=29396 a0=3 a1=7fffd2e07770 a2=0 a3=7fffd2e0775c items=0 ppid=4133 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.747000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:10.750725 env[1739]: time="2025-05-17T00:41:10.750668194Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:10.753220 env[1739]: time="2025-05-17T00:41:10.753151238Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:10.753699 kubelet[2612]: E0517 00:41:10.753643 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:10.754069 kubelet[2612]: E0517 00:41:10.753722 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:10.754069 kubelet[2612]: E0517 00:41:10.753900 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:10.757779 kubelet[2612]: E0517 00:41:10.757694 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.367 [INFO][4517] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0 calico-kube-controllers-577d59dd8d- calico-system 0106ba82-539e-49ae-85cf-21d470967512 938 0 2025-05-17 00:40:45 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:577d59dd8d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-25-158 calico-kube-controllers-577d59dd8d-5cp45 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali31c15d4cea7 [] [] }} ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.367 [INFO][4517] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.447 [INFO][4549] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" HandleID="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.447 [INFO][4549] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" HandleID="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9980), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-158", "pod":"calico-kube-controllers-577d59dd8d-5cp45", "timestamp":"2025-05-17 00:41:10.446602629 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.447 [INFO][4549] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.468 [INFO][4549] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.468 [INFO][4549] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.527 [INFO][4549] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.551 [INFO][4549] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.584 [INFO][4549] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.595 [INFO][4549] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.610 [INFO][4549] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.610 [INFO][4549] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.613 [INFO][4549] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5 May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.621 [INFO][4549] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.670 [INFO][4549] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.132/26] block=192.168.111.128/26 handle="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.670 [INFO][4549] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.132/26] handle="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" host="ip-172-31-25-158" May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.670 [INFO][4549] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:10.766281 env[1739]: 2025-05-17 00:41:10.670 [INFO][4549] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.132/26] IPv6=[] ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" HandleID="k8s-pod-network.a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.767951 env[1739]: 2025-05-17 00:41:10.676 [INFO][4517] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0", GenerateName:"calico-kube-controllers-577d59dd8d-", Namespace:"calico-system", SelfLink:"", UID:"0106ba82-539e-49ae-85cf-21d470967512", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"577d59dd8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"calico-kube-controllers-577d59dd8d-5cp45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31c15d4cea7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:10.767951 env[1739]: 2025-05-17 00:41:10.677 [INFO][4517] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.132/32] ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.767951 env[1739]: 2025-05-17 00:41:10.677 [INFO][4517] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali31c15d4cea7 ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.767951 env[1739]: 2025-05-17 00:41:10.680 [INFO][4517] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.767951 env[1739]: 2025-05-17 00:41:10.681 [INFO][4517] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0", GenerateName:"calico-kube-controllers-577d59dd8d-", Namespace:"calico-system", SelfLink:"", UID:"0106ba82-539e-49ae-85cf-21d470967512", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"577d59dd8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5", Pod:"calico-kube-controllers-577d59dd8d-5cp45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31c15d4cea7", MAC:"de:4c:4c:25:43:be", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:10.767951 env[1739]: 2025-05-17 00:41:10.763 [INFO][4517] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5" Namespace="calico-system" Pod="calico-kube-controllers-577d59dd8d-5cp45" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:10.791705 env[1739]: time="2025-05-17T00:41:10.791605578Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:10.791885 env[1739]: time="2025-05-17T00:41:10.791730354Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:10.791885 env[1739]: time="2025-05-17T00:41:10.791796750Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:10.792054 env[1739]: time="2025-05-17T00:41:10.792009858Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5 pid=4620 runtime=io.containerd.runc.v2 May 17 00:41:10.823668 systemd[1]: Started cri-containerd-a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5.scope. May 17 00:41:10.853556 systemd-networkd[1462]: cali0e9ba9848c5: Gained IPv6LL May 17 00:41:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.867000 audit: BPF prog-id=172 op=LOAD May 17 00:41:10.868000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4571 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330616265646132363738613166663330316162376561373833353535 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4571 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330616265646132363738613166663330316162376561373833353535 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.868000 audit: BPF prog-id=173 op=LOAD May 17 00:41:10.868000 audit[4582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002108c0 items=0 ppid=4571 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330616265646132363738613166663330316162376561373833353535 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.870000 audit: BPF prog-id=174 op=LOAD May 17 00:41:10.870000 audit[4582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000210908 items=0 ppid=4571 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330616265646132363738613166663330316162376561373833353535 May 17 00:41:10.871000 audit: BPF prog-id=174 op=UNLOAD May 17 00:41:10.871000 audit: BPF prog-id=173 op=UNLOAD May 17 00:41:10.871000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { perfmon } for pid=4582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit[4582]: AVC avc: denied { bpf } for pid=4582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.871000 audit: BPF prog-id=175 op=LOAD May 17 00:41:10.871000 audit[4582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000210d18 items=0 ppid=4571 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330616265646132363738613166663330316162376561373833353535 May 17 00:41:10.897957 kubelet[2612]: I0517 00:41:10.897915 2612 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="942512a4-77b8-4313-9871-7733dbf6b00d" path="/var/lib/kubelet/pods/942512a4-77b8-4313-9871-7733dbf6b00d/volumes" May 17 00:41:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit: BPF prog-id=176 op=LOAD May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4620 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356432656637613030313263316630353134613337376535666631 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4620 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356432656637613030313263316630353134613337376535666631 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit: BPF prog-id=177 op=LOAD May 17 00:41:10.991000 audit[4629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003826e0 items=0 ppid=4620 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356432656637613030313263316630353134613337376535666631 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit: BPF prog-id=178 op=LOAD May 17 00:41:10.991000 audit[4629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000382728 items=0 ppid=4620 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356432656637613030313263316630353134613337376535666631 May 17 00:41:10.991000 audit: BPF prog-id=178 op=UNLOAD May 17 00:41:10.991000 audit: BPF prog-id=177 op=UNLOAD May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { perfmon } for pid=4629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit[4629]: AVC avc: denied { bpf } for pid=4629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.991000 audit: BPF prog-id=179 op=LOAD May 17 00:41:10.991000 audit[4629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000382b38 items=0 ppid=4620 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356432656637613030313263316630353134613337376535666631 May 17 00:41:11.006000 audit[4648]: NETFILTER_CFG table=filter:110 family=2 entries=44 op=nft_register_chain pid=4648 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:11.006000 audit[4648]: SYSCALL arch=c000003e syscall=46 success=yes exit=21952 a0=3 a1=7ffcad8ad1c0 a2=0 a3=7ffcad8ad1ac items=0 ppid=4133 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.006000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:11.024566 systemd[1]: Started sshd@7-172.31.25.158:22-139.178.68.195:60582.service. May 17 00:41:11.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.25.158:22-139.178.68.195:60582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:11.053107 env[1739]: time="2025-05-17T00:41:11.053068155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-ncxj8,Uid:b7d1186a-bf30-4dec-8152-532be5293024,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209\"" May 17 00:41:11.057709 env[1739]: time="2025-05-17T00:41:11.057669212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:41:11.090977 env[1739]: time="2025-05-17T00:41:11.090932045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-577d59dd8d-5cp45,Uid:0106ba82-539e-49ae-85cf-21d470967512,Namespace:calico-system,Attempt:1,} returns sandbox id \"a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5\"" May 17 00:41:11.233142 kubelet[2612]: E0517 00:41:11.227349 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:41:11.249067 kubelet[2612]: E0517 00:41:11.248905 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:41:11.258348 kernel: kauditd_printk_skb: 795 callbacks suppressed May 17 00:41:11.258504 kernel: audit: type=1101 audit(1747442471.252:1224): pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.252000 audit[4650]: USER_ACCT pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.258665 sshd[4650]: Accepted publickey for core from 139.178.68.195 port 60582 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:11.266592 kernel: audit: type=1103 audit(1747442471.258:1225): pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.266665 kernel: audit: type=1006 audit(1747442471.258:1226): pid=4650 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 17 00:41:11.258000 audit[4650]: CRED_ACQ pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.263886 sshd[4650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:11.258000 audit[4650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cd5dd20 a2=3 a3=0 items=0 ppid=1 pid=4650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.275295 kernel: audit: type=1300 audit(1747442471.258:1226): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cd5dd20 a2=3 a3=0 items=0 ppid=1 pid=4650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:11.278150 kernel: audit: type=1327 audit(1747442471.258:1226): proctitle=737368643A20636F7265205B707269765D May 17 00:41:11.278567 systemd-logind[1731]: New session 8 of user core. May 17 00:41:11.280240 systemd[1]: Started session-8.scope. May 17 00:41:11.291000 audit[4650]: USER_START pid=4650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.300089 kernel: audit: type=1105 audit(1747442471.291:1227): pid=4650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.300248 kernel: audit: type=1103 audit(1747442471.293:1228): pid=4666 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.293000 audit[4666]: CRED_ACQ pid=4666 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.302000 audit[4665]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:11.302000 audit[4665]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffead2878a0 a2=0 a3=7ffead28788c items=0 ppid=2715 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.317840 kernel: audit: type=1325 audit(1747442471.302:1229): table=filter:111 family=2 entries=20 op=nft_register_rule pid=4665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:11.317976 kernel: audit: type=1300 audit(1747442471.302:1229): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffead2878a0 a2=0 a3=7ffead28788c items=0 ppid=2715 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:11.310000 audit[4665]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=4665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:11.310000 audit[4665]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffead2878a0 a2=0 a3=0 items=0 ppid=2715 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:11.323195 kernel: audit: type=1327 audit(1747442471.302:1229): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:11.495256 systemd-networkd[1462]: calif378826d3f6: Gained IPv6LL May 17 00:41:11.891952 env[1739]: time="2025-05-17T00:41:11.891907072Z" level=info msg="StopPodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\"" May 17 00:41:11.892200 env[1739]: time="2025-05-17T00:41:11.891907279Z" level=info msg="StopPodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\"" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:11.996 [INFO][4693] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:11.996 [INFO][4693] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" iface="eth0" netns="/var/run/netns/cni-5844fc24-bc17-a72a-5e81-5a5909fda9c2" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:11.997 [INFO][4693] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" iface="eth0" netns="/var/run/netns/cni-5844fc24-bc17-a72a-5e81-5a5909fda9c2" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.000 [INFO][4693] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" iface="eth0" netns="/var/run/netns/cni-5844fc24-bc17-a72a-5e81-5a5909fda9c2" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.005 [INFO][4693] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.005 [INFO][4693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.085 [INFO][4708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.085 [INFO][4708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.085 [INFO][4708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.096 [WARNING][4708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.097 [INFO][4708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.098 [INFO][4708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:12.113698 env[1739]: 2025-05-17 00:41:12.103 [INFO][4693] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:12.117332 systemd[1]: run-netns-cni\x2d5844fc24\x2dbc17\x2da72a\x2d5e81\x2d5a5909fda9c2.mount: Deactivated successfully. May 17 00:41:12.125526 env[1739]: time="2025-05-17T00:41:12.124134001Z" level=info msg="TearDown network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" successfully" May 17 00:41:12.125526 env[1739]: time="2025-05-17T00:41:12.125428927Z" level=info msg="StopPodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" returns successfully" May 17 00:41:12.128959 env[1739]: time="2025-05-17T00:41:12.128894433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zzbw,Uid:8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287,Namespace:kube-system,Attempt:1,}" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.016 [INFO][4697] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.016 [INFO][4697] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" iface="eth0" netns="/var/run/netns/cni-30055732-3401-5f45-d284-eca74bbf2a13" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.016 [INFO][4697] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" iface="eth0" netns="/var/run/netns/cni-30055732-3401-5f45-d284-eca74bbf2a13" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.016 [INFO][4697] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" iface="eth0" netns="/var/run/netns/cni-30055732-3401-5f45-d284-eca74bbf2a13" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.016 [INFO][4697] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.016 [INFO][4697] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.108 [INFO][4713] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.108 [INFO][4713] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.108 [INFO][4713] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.131 [WARNING][4713] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.131 [INFO][4713] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.134 [INFO][4713] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:12.143426 env[1739]: 2025-05-17 00:41:12.140 [INFO][4697] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:12.144808 env[1739]: time="2025-05-17T00:41:12.144763859Z" level=info msg="TearDown network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" successfully" May 17 00:41:12.144951 env[1739]: time="2025-05-17T00:41:12.144931189Z" level=info msg="StopPodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" returns successfully" May 17 00:41:12.147512 env[1739]: time="2025-05-17T00:41:12.147474192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-h4plp,Uid:5fe1896b-fa6b-4c91-abac-c9f76ba079a0,Namespace:kube-system,Attempt:1,}" May 17 00:41:12.147728 systemd[1]: run-netns-cni\x2d30055732\x2d3401\x2d5f45\x2dd284\x2deca74bbf2a13.mount: Deactivated successfully. May 17 00:41:12.197904 systemd-networkd[1462]: cali31c15d4cea7: Gained IPv6LL May 17 00:41:12.253404 kubelet[2612]: E0517 00:41:12.253357 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:41:12.305146 sshd[4650]: pam_unix(sshd:session): session closed for user core May 17 00:41:12.309000 audit[4650]: USER_END pid=4650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:12.309000 audit[4650]: CRED_DISP pid=4650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:12.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.25.158:22-139.178.68.195:60582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:12.311441 systemd[1]: sshd@7-172.31.25.158:22-139.178.68.195:60582.service: Deactivated successfully. May 17 00:41:12.312472 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:41:12.319834 systemd-logind[1731]: Session 8 logged out. Waiting for processes to exit. May 17 00:41:12.321037 systemd-logind[1731]: Removed session 8. May 17 00:41:12.328064 systemd-networkd[1462]: cali8c938fbd1a4: Gained IPv6LL May 17 00:41:12.632393 systemd-networkd[1462]: calia0f423c65bf: Link UP May 17 00:41:12.640534 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:12.640684 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0f423c65bf: link becomes ready May 17 00:41:12.641495 systemd-networkd[1462]: calia0f423c65bf: Gained carrier May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.382 [INFO][4724] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0 coredns-668d6bf9bc- kube-system 5fe1896b-fa6b-4c91-abac-c9f76ba079a0 1006 0 2025-05-17 00:40:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-25-158 coredns-668d6bf9bc-h4plp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia0f423c65bf [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.382 [INFO][4724] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.554 [INFO][4748] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" HandleID="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.555 [INFO][4748] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" HandleID="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000234e90), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-25-158", "pod":"coredns-668d6bf9bc-h4plp", "timestamp":"2025-05-17 00:41:12.543033864 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.555 [INFO][4748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.555 [INFO][4748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.555 [INFO][4748] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.572 [INFO][4748] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.581 [INFO][4748] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.587 [INFO][4748] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.590 [INFO][4748] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.593 [INFO][4748] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.593 [INFO][4748] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.596 [INFO][4748] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.603 [INFO][4748] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.621 [INFO][4748] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.133/26] block=192.168.111.128/26 handle="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.621 [INFO][4748] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.133/26] handle="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" host="ip-172-31-25-158" May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.621 [INFO][4748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:12.700253 env[1739]: 2025-05-17 00:41:12.621 [INFO][4748] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.133/26] IPv6=[] ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" HandleID="k8s-pod-network.1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.701396 env[1739]: 2025-05-17 00:41:12.625 [INFO][4724] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"5fe1896b-fa6b-4c91-abac-c9f76ba079a0", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"coredns-668d6bf9bc-h4plp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f423c65bf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:12.701396 env[1739]: 2025-05-17 00:41:12.625 [INFO][4724] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.133/32] ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.701396 env[1739]: 2025-05-17 00:41:12.625 [INFO][4724] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia0f423c65bf ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.701396 env[1739]: 2025-05-17 00:41:12.656 [INFO][4724] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.701396 env[1739]: 2025-05-17 00:41:12.656 [INFO][4724] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"5fe1896b-fa6b-4c91-abac-c9f76ba079a0", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f", Pod:"coredns-668d6bf9bc-h4plp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f423c65bf", MAC:"5a:32:26:12:70:4f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:12.701396 env[1739]: 2025-05-17 00:41:12.686 [INFO][4724] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f" Namespace="kube-system" Pod="coredns-668d6bf9bc-h4plp" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:12.745540 systemd-networkd[1462]: calia80c6a3ef48: Link UP May 17 00:41:12.748757 systemd-networkd[1462]: calia80c6a3ef48: Gained carrier May 17 00:41:12.749288 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia80c6a3ef48: link becomes ready May 17 00:41:12.776550 env[1739]: time="2025-05-17T00:41:12.776453234Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:12.776799 env[1739]: time="2025-05-17T00:41:12.776772861Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:12.776954 env[1739]: time="2025-05-17T00:41:12.776930979Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:12.777335 env[1739]: time="2025-05-17T00:41:12.777289766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f pid=4775 runtime=io.containerd.runc.v2 May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.416 [INFO][4722] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0 coredns-668d6bf9bc- kube-system 8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287 1005 0 2025-05-17 00:40:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-25-158 coredns-668d6bf9bc-6zzbw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia80c6a3ef48 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.416 [INFO][4722] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.569 [INFO][4754] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" HandleID="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.570 [INFO][4754] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" HandleID="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038ce20), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-25-158", "pod":"coredns-668d6bf9bc-6zzbw", "timestamp":"2025-05-17 00:41:12.569921245 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.570 [INFO][4754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.621 [INFO][4754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.622 [INFO][4754] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.685 [INFO][4754] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.695 [INFO][4754] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.709 [INFO][4754] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.712 [INFO][4754] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.718 [INFO][4754] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.718 [INFO][4754] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.720 [INFO][4754] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.728 [INFO][4754] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.738 [INFO][4754] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.134/26] block=192.168.111.128/26 handle="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.738 [INFO][4754] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.134/26] handle="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" host="ip-172-31-25-158" May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.738 [INFO][4754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:12.778891 env[1739]: 2025-05-17 00:41:12.738 [INFO][4754] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.134/26] IPv6=[] ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" HandleID="k8s-pod-network.a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.779861 env[1739]: 2025-05-17 00:41:12.742 [INFO][4722] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"coredns-668d6bf9bc-6zzbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia80c6a3ef48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:12.779861 env[1739]: 2025-05-17 00:41:12.742 [INFO][4722] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.134/32] ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.779861 env[1739]: 2025-05-17 00:41:12.742 [INFO][4722] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia80c6a3ef48 ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.779861 env[1739]: 2025-05-17 00:41:12.749 [INFO][4722] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.779861 env[1739]: 2025-05-17 00:41:12.750 [INFO][4722] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a", Pod:"coredns-668d6bf9bc-6zzbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia80c6a3ef48", MAC:"12:ad:a6:29:82:ec", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:12.779861 env[1739]: 2025-05-17 00:41:12.775 [INFO][4722] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6zzbw" WorkloadEndpoint="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:12.810814 systemd[1]: Started cri-containerd-1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f.scope. May 17 00:41:12.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.843000 audit: BPF prog-id=180 op=LOAD May 17 00:41:12.844000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.844000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=4775 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353966633139333735313261373732326561323863323639623335 May 17 00:41:12.844000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.844000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=4775 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353966633139333735313261373732326561323863323639623335 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit: BPF prog-id=181 op=LOAD May 17 00:41:12.845000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c000346c40 items=0 ppid=4775 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353966633139333735313261373732326561323863323639623335 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit: BPF prog-id=182 op=LOAD May 17 00:41:12.845000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c000346c88 items=0 ppid=4775 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353966633139333735313261373732326561323863323639623335 May 17 00:41:12.845000 audit: BPF prog-id=182 op=UNLOAD May 17 00:41:12.845000 audit: BPF prog-id=181 op=UNLOAD May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.845000 audit: BPF prog-id=183 op=LOAD May 17 00:41:12.845000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c000347098 items=0 ppid=4775 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353966633139333735313261373732326561323863323639623335 May 17 00:41:12.860629 env[1739]: time="2025-05-17T00:41:12.860507493Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:12.860629 env[1739]: time="2025-05-17T00:41:12.860625981Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:12.860985 env[1739]: time="2025-05-17T00:41:12.860657128Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:12.861751 env[1739]: time="2025-05-17T00:41:12.861506960Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a pid=4820 runtime=io.containerd.runc.v2 May 17 00:41:12.900636 systemd[1]: Started cri-containerd-a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a.scope. May 17 00:41:12.940590 env[1739]: time="2025-05-17T00:41:12.933572693Z" level=info msg="StopPodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\"" May 17 00:41:12.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.995000 audit: BPF prog-id=184 op=LOAD May 17 00:41:12.996000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.996000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4820 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653331343562623734363933343565643938336334643765313466 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4820 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653331343562623734363933343565643938336334643765313466 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:12.998000 audit: BPF prog-id=185 op=LOAD May 17 00:41:12.998000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000378990 items=0 ppid=4820 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:12.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653331343562623734363933343565643938336334643765313466 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.003000 audit: BPF prog-id=186 op=LOAD May 17 00:41:13.003000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003789d8 items=0 ppid=4820 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653331343562623734363933343565643938336334643765313466 May 17 00:41:13.004000 audit: BPF prog-id=186 op=UNLOAD May 17 00:41:13.004000 audit: BPF prog-id=185 op=UNLOAD May 17 00:41:13.004000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.004000 audit: BPF prog-id=187 op=LOAD May 17 00:41:13.004000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000378de8 items=0 ppid=4820 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653331343562623734363933343565643938336334643765313466 May 17 00:41:13.043296 env[1739]: time="2025-05-17T00:41:13.043250130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-h4plp,Uid:5fe1896b-fa6b-4c91-abac-c9f76ba079a0,Namespace:kube-system,Attempt:1,} returns sandbox id \"1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f\"" May 17 00:41:13.084504 env[1739]: time="2025-05-17T00:41:13.084458170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6zzbw,Uid:8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287,Namespace:kube-system,Attempt:1,} returns sandbox id \"a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a\"" May 17 00:41:13.102046 env[1739]: time="2025-05-17T00:41:13.101999542Z" level=info msg="CreateContainer within sandbox \"a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:41:13.102872 env[1739]: time="2025-05-17T00:41:13.102838694Z" level=info msg="CreateContainer within sandbox \"1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:41:13.151000 audit[4875]: NETFILTER_CFG table=filter:113 family=2 entries=54 op=nft_register_chain pid=4875 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:13.151000 audit[4875]: SYSCALL arch=c000003e syscall=46 success=yes exit=26116 a0=3 a1=7fffa1423ea0 a2=0 a3=7fffa1423e8c items=0 ppid=4133 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.151000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:13.195371 env[1739]: time="2025-05-17T00:41:13.195319510Z" level=info msg="CreateContainer within sandbox \"1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0c4f8de138874786b1b7d1e4805d9fb49db2c6e8b86ae7b0fd98fc45d38201ee\"" May 17 00:41:13.198404 env[1739]: time="2025-05-17T00:41:13.198364509Z" level=info msg="StartContainer for \"0c4f8de138874786b1b7d1e4805d9fb49db2c6e8b86ae7b0fd98fc45d38201ee\"" May 17 00:41:13.204044 env[1739]: time="2025-05-17T00:41:13.203990636Z" level=info msg="CreateContainer within sandbox \"a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"705c0e05f21e93093e5bdfa7990e955ede50748db50adf1b907a72d156d3ab30\"" May 17 00:41:13.204644 env[1739]: time="2025-05-17T00:41:13.204612767Z" level=info msg="StartContainer for \"705c0e05f21e93093e5bdfa7990e955ede50748db50adf1b907a72d156d3ab30\"" May 17 00:41:13.240279 systemd[1]: run-containerd-runc-k8s.io-a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a-runc.Gde33S.mount: Deactivated successfully. May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.160 [INFO][4856] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.160 [INFO][4856] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" iface="eth0" netns="/var/run/netns/cni-73895b4c-ae6e-9779-54b1-661b8bb987fc" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.161 [INFO][4856] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" iface="eth0" netns="/var/run/netns/cni-73895b4c-ae6e-9779-54b1-661b8bb987fc" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.164 [INFO][4856] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" iface="eth0" netns="/var/run/netns/cni-73895b4c-ae6e-9779-54b1-661b8bb987fc" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.164 [INFO][4856] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.164 [INFO][4856] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.227 [INFO][4879] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.228 [INFO][4879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.228 [INFO][4879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.254 [WARNING][4879] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.254 [INFO][4879] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.257 [INFO][4879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:13.264379 env[1739]: 2025-05-17 00:41:13.261 [INFO][4856] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:13.269060 systemd[1]: run-netns-cni\x2d73895b4c\x2dae6e\x2d9779\x2d54b1\x2d661b8bb987fc.mount: Deactivated successfully. May 17 00:41:13.272204 env[1739]: time="2025-05-17T00:41:13.271213813Z" level=info msg="TearDown network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" successfully" May 17 00:41:13.272204 env[1739]: time="2025-05-17T00:41:13.271260880Z" level=info msg="StopPodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" returns successfully" May 17 00:41:13.272669 env[1739]: time="2025-05-17T00:41:13.272633788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q5bk6,Uid:4732e8d0-52d1-4d24-aead-cc04fa7b437f,Namespace:calico-system,Attempt:1,}" May 17 00:41:13.315257 systemd[1]: Started cri-containerd-0c4f8de138874786b1b7d1e4805d9fb49db2c6e8b86ae7b0fd98fc45d38201ee.scope. May 17 00:41:13.348468 systemd[1]: Started cri-containerd-705c0e05f21e93093e5bdfa7990e955ede50748db50adf1b907a72d156d3ab30.scope. May 17 00:41:13.351000 audit[4910]: NETFILTER_CFG table=filter:114 family=2 entries=54 op=nft_register_chain pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.353000 audit: BPF prog-id=188 op=LOAD May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4775 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346638646531333838373437383662316237643165343830356439 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4775 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346638646531333838373437383662316237643165343830356439 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit: BPF prog-id=189 op=LOAD May 17 00:41:13.355000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b7020 items=0 ppid=4775 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346638646531333838373437383662316237643165343830356439 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit: BPF prog-id=190 op=LOAD May 17 00:41:13.355000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b7068 items=0 ppid=4775 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346638646531333838373437383662316237643165343830356439 May 17 00:41:13.355000 audit: BPF prog-id=190 op=UNLOAD May 17 00:41:13.355000 audit: BPF prog-id=189 op=UNLOAD May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.355000 audit: BPF prog-id=191 op=LOAD May 17 00:41:13.355000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b7478 items=0 ppid=4775 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346638646531333838373437383662316237643165343830356439 May 17 00:41:13.351000 audit[4910]: SYSCALL arch=c000003e syscall=46 success=yes exit=25572 a0=3 a1=7ffc33f9ccd0 a2=0 a3=7ffc33f9ccbc items=0 ppid=4133 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.398000 audit: BPF prog-id=192 op=LOAD May 17 00:41:13.399000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.399000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4820 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730356330653035663231653933303933653562646661373939306539 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4820 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730356330653035663231653933303933653562646661373939306539 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.400000 audit: BPF prog-id=193 op=LOAD May 17 00:41:13.400000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dffe0 items=0 ppid=4820 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730356330653035663231653933303933653562646661373939306539 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit: BPF prog-id=194 op=LOAD May 17 00:41:13.401000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296028 items=0 ppid=4820 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730356330653035663231653933303933653562646661373939306539 May 17 00:41:13.401000 audit: BPF prog-id=194 op=UNLOAD May 17 00:41:13.401000 audit: BPF prog-id=193 op=UNLOAD May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.401000 audit: BPF prog-id=195 op=LOAD May 17 00:41:13.401000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000296438 items=0 ppid=4820 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730356330653035663231653933303933653562646661373939306539 May 17 00:41:13.438414 env[1739]: time="2025-05-17T00:41:13.438359707Z" level=info msg="StartContainer for \"0c4f8de138874786b1b7d1e4805d9fb49db2c6e8b86ae7b0fd98fc45d38201ee\" returns successfully" May 17 00:41:13.444633 env[1739]: time="2025-05-17T00:41:13.444584141Z" level=info msg="StartContainer for \"705c0e05f21e93093e5bdfa7990e955ede50748db50adf1b907a72d156d3ab30\" returns successfully" May 17 00:41:13.610239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali06ff4f894e4: link becomes ready May 17 00:41:13.609859 systemd-networkd[1462]: cali06ff4f894e4: Link UP May 17 00:41:13.611200 systemd-networkd[1462]: cali06ff4f894e4: Gained carrier May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.466 [INFO][4909] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0 csi-node-driver- calico-system 4732e8d0-52d1-4d24-aead-cc04fa7b437f 1032 0 2025-05-17 00:40:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-25-158 csi-node-driver-q5bk6 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali06ff4f894e4 [] [] }} ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.467 [INFO][4909] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.525 [INFO][4960] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" HandleID="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.525 [INFO][4960] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" HandleID="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325510), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-158", "pod":"csi-node-driver-q5bk6", "timestamp":"2025-05-17 00:41:13.525653275 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.526 [INFO][4960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.526 [INFO][4960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.526 [INFO][4960] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.540 [INFO][4960] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.561 [INFO][4960] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.569 [INFO][4960] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.571 [INFO][4960] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.576 [INFO][4960] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.576 [INFO][4960] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.578 [INFO][4960] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.586 [INFO][4960] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.600 [INFO][4960] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.135/26] block=192.168.111.128/26 handle="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.600 [INFO][4960] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.135/26] handle="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" host="ip-172-31-25-158" May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.600 [INFO][4960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:13.636144 env[1739]: 2025-05-17 00:41:13.600 [INFO][4960] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.135/26] IPv6=[] ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" HandleID="k8s-pod-network.22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.637308 env[1739]: 2025-05-17 00:41:13.604 [INFO][4909] cni-plugin/k8s.go 418: Populated endpoint ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4732e8d0-52d1-4d24-aead-cc04fa7b437f", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"csi-node-driver-q5bk6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali06ff4f894e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:13.637308 env[1739]: 2025-05-17 00:41:13.604 [INFO][4909] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.135/32] ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.637308 env[1739]: 2025-05-17 00:41:13.604 [INFO][4909] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali06ff4f894e4 ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.637308 env[1739]: 2025-05-17 00:41:13.609 [INFO][4909] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.637308 env[1739]: 2025-05-17 00:41:13.610 [INFO][4909] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4732e8d0-52d1-4d24-aead-cc04fa7b437f", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e", Pod:"csi-node-driver-q5bk6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali06ff4f894e4", MAC:"ba:68:a6:c3:be:99", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:13.637308 env[1739]: 2025-05-17 00:41:13.631 [INFO][4909] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e" Namespace="calico-system" Pod="csi-node-driver-q5bk6" WorkloadEndpoint="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:13.686241 env[1739]: time="2025-05-17T00:41:13.686154018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:13.686431 env[1739]: time="2025-05-17T00:41:13.686272443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:13.686431 env[1739]: time="2025-05-17T00:41:13.686310831Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:13.686605 env[1739]: time="2025-05-17T00:41:13.686557886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e pid=4982 runtime=io.containerd.runc.v2 May 17 00:41:13.722937 systemd[1]: Started cri-containerd-22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e.scope. May 17 00:41:13.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit: BPF prog-id=196 op=LOAD May 17 00:41:13.805000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4982 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633964613636383761626165323236393934323639623536393938 May 17 00:41:13.805000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.805000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4982 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633964613636383761626165323236393934323639623536393938 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit: BPF prog-id=197 op=LOAD May 17 00:41:13.806000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286520 items=0 ppid=4982 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633964613636383761626165323236393934323639623536393938 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit: BPF prog-id=198 op=LOAD May 17 00:41:13.806000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286568 items=0 ppid=4982 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633964613636383761626165323236393934323639623536393938 May 17 00:41:13.806000 audit: BPF prog-id=198 op=UNLOAD May 17 00:41:13.806000 audit: BPF prog-id=197 op=UNLOAD May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.806000 audit: BPF prog-id=199 op=LOAD May 17 00:41:13.806000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000286978 items=0 ppid=4982 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633964613636383761626165323236393934323639623536393938 May 17 00:41:13.813000 audit[5010]: NETFILTER_CFG table=filter:115 family=2 entries=58 op=nft_register_chain pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:13.813000 audit[5010]: SYSCALL arch=c000003e syscall=46 success=yes exit=27164 a0=3 a1=7fffc10568b0 a2=0 a3=7fffc105689c items=0 ppid=4133 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.813000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:13.849963 env[1739]: time="2025-05-17T00:41:13.849910375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q5bk6,Uid:4732e8d0-52d1-4d24-aead-cc04fa7b437f,Namespace:calico-system,Attempt:1,} returns sandbox id \"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e\"" May 17 00:41:13.896392 env[1739]: time="2025-05-17T00:41:13.892100892Z" level=info msg="StopPodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\"" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.042 [INFO][5027] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.042 [INFO][5027] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" iface="eth0" netns="/var/run/netns/cni-d1e7c06f-5234-03cd-4e85-f8a01c39c395" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.042 [INFO][5027] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" iface="eth0" netns="/var/run/netns/cni-d1e7c06f-5234-03cd-4e85-f8a01c39c395" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.043 [INFO][5027] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" iface="eth0" netns="/var/run/netns/cni-d1e7c06f-5234-03cd-4e85-f8a01c39c395" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.043 [INFO][5027] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.043 [INFO][5027] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.095 [INFO][5034] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.095 [INFO][5034] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.095 [INFO][5034] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.104 [WARNING][5034] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.104 [INFO][5034] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.106 [INFO][5034] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:14.112762 env[1739]: 2025-05-17 00:41:14.110 [INFO][5027] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:14.119364 env[1739]: time="2025-05-17T00:41:14.119310266Z" level=info msg="TearDown network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" successfully" May 17 00:41:14.119543 env[1739]: time="2025-05-17T00:41:14.119519425Z" level=info msg="StopPodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" returns successfully" May 17 00:41:14.121105 env[1739]: time="2025-05-17T00:41:14.121066338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-55s66,Uid:a3f52808-2a82-44e1-80ef-38473ae77d9b,Namespace:calico-apiserver,Attempt:1,}" May 17 00:41:14.241550 systemd[1]: run-netns-cni\x2dd1e7c06f\x2d5234\x2d03cd\x2d4e85\x2df8a01c39c395.mount: Deactivated successfully. May 17 00:41:14.315237 kubelet[2612]: I0517 00:41:14.315152 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-6zzbw" podStartSLOduration=45.306605728 podStartE2EDuration="45.306605728s" podCreationTimestamp="2025-05-17 00:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:41:14.305809568 +0000 UTC m=+49.728114445" watchObservedRunningTime="2025-05-17 00:41:14.306605728 +0000 UTC m=+49.728910602" May 17 00:41:14.370000 audit[5067]: NETFILTER_CFG table=filter:116 family=2 entries=20 op=nft_register_rule pid=5067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:14.370000 audit[5067]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff644b6e50 a2=0 a3=7fff644b6e3c items=0 ppid=2715 pid=5067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:14.374246 systemd-networkd[1462]: calia80c6a3ef48: Gained IPv6LL May 17 00:41:14.377000 audit[5067]: NETFILTER_CFG table=nat:117 family=2 entries=14 op=nft_register_rule pid=5067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:14.377000 audit[5067]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff644b6e50 a2=0 a3=0 items=0 ppid=2715 pid=5067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:14.425178 systemd-networkd[1462]: calibe80a16303a: Link UP May 17 00:41:14.432253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:14.432382 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibe80a16303a: link becomes ready May 17 00:41:14.428939 systemd-networkd[1462]: calibe80a16303a: Gained carrier May 17 00:41:14.450000 audit[5072]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:14.450000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff4dc93100 a2=0 a3=7fff4dc930ec items=0 ppid=2715 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:14.454589 kubelet[2612]: I0517 00:41:14.453671 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-h4plp" podStartSLOduration=45.453645023 podStartE2EDuration="45.453645023s" podCreationTimestamp="2025-05-17 00:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:41:14.346337695 +0000 UTC m=+49.768642569" watchObservedRunningTime="2025-05-17 00:41:14.453645023 +0000 UTC m=+49.875949895" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.230 [INFO][5040] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0 calico-apiserver-6b4b9bd5c8- calico-apiserver a3f52808-2a82-44e1-80ef-38473ae77d9b 1049 0 2025-05-17 00:40:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b4b9bd5c8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-25-158 calico-apiserver-6b4b9bd5c8-55s66 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibe80a16303a [] [] }} ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.231 [INFO][5040] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.319 [INFO][5060] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" HandleID="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.320 [INFO][5060] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" HandleID="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-25-158", "pod":"calico-apiserver-6b4b9bd5c8-55s66", "timestamp":"2025-05-17 00:41:14.318889972 +0000 UTC"}, Hostname:"ip-172-31-25-158", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.320 [INFO][5060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.320 [INFO][5060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.320 [INFO][5060] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-158' May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.334 [INFO][5060] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.350 [INFO][5060] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.362 [INFO][5060] ipam/ipam.go 511: Trying affinity for 192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.367 [INFO][5060] ipam/ipam.go 158: Attempting to load block cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.379 [INFO][5060] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.379 [INFO][5060] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.389 [INFO][5060] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.401 [INFO][5060] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.412 [INFO][5060] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.111.136/26] block=192.168.111.128/26 handle="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.412 [INFO][5060] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.111.136/26] handle="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" host="ip-172-31-25-158" May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.412 [INFO][5060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:14.460581 env[1739]: 2025-05-17 00:41:14.412 [INFO][5060] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.136/26] IPv6=[] ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" HandleID="k8s-pod-network.5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.461872 env[1739]: 2025-05-17 00:41:14.415 [INFO][5040] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a3f52808-2a82-44e1-80ef-38473ae77d9b", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"", Pod:"calico-apiserver-6b4b9bd5c8-55s66", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibe80a16303a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:14.461872 env[1739]: 2025-05-17 00:41:14.415 [INFO][5040] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.111.136/32] ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.461872 env[1739]: 2025-05-17 00:41:14.415 [INFO][5040] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibe80a16303a ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.461872 env[1739]: 2025-05-17 00:41:14.440 [INFO][5040] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.461872 env[1739]: 2025-05-17 00:41:14.441 [INFO][5040] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a3f52808-2a82-44e1-80ef-38473ae77d9b", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a", Pod:"calico-apiserver-6b4b9bd5c8-55s66", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibe80a16303a", MAC:"26:d0:11:b8:47:10", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:14.461872 env[1739]: 2025-05-17 00:41:14.456 [INFO][5040] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a" Namespace="calico-apiserver" Pod="calico-apiserver-6b4b9bd5c8-55s66" WorkloadEndpoint="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:14.463000 audit[5072]: NETFILTER_CFG table=nat:119 family=2 entries=14 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:14.463000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff4dc93100 a2=0 a3=0 items=0 ppid=2715 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:14.500000 audit[5085]: NETFILTER_CFG table=filter:120 family=2 entries=53 op=nft_register_chain pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:14.500000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=26608 a0=3 a1=7ffce1afecb0 a2=0 a3=7ffce1afec9c items=0 ppid=4133 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.500000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:14.503944 env[1739]: time="2025-05-17T00:41:14.503869018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:14.504078 env[1739]: time="2025-05-17T00:41:14.503980799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:14.504078 env[1739]: time="2025-05-17T00:41:14.504027868Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:14.504316 env[1739]: time="2025-05-17T00:41:14.504269900Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a pid=5086 runtime=io.containerd.runc.v2 May 17 00:41:14.558445 systemd[1]: Started cri-containerd-5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a.scope. May 17 00:41:14.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.590000 audit: BPF prog-id=200 op=LOAD May 17 00:41:14.592000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5086 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306466323735326661333365376262333666643631643134303165 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5086 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306466323735326661333365376262333666643631643134303165 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.592000 audit: BPF prog-id=201 op=LOAD May 17 00:41:14.592000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000408350 items=0 ppid=5086 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306466323735326661333365376262333666643631643134303165 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.593000 audit: BPF prog-id=202 op=LOAD May 17 00:41:14.593000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000408398 items=0 ppid=5086 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306466323735326661333365376262333666643631643134303165 May 17 00:41:14.594000 audit: BPF prog-id=202 op=UNLOAD May 17 00:41:14.594000 audit: BPF prog-id=201 op=UNLOAD May 17 00:41:14.594000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.594000 audit: BPF prog-id=203 op=LOAD May 17 00:41:14.594000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004087a8 items=0 ppid=5086 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306466323735326661333365376262333666643631643134303165 May 17 00:41:14.629806 systemd-networkd[1462]: calia0f423c65bf: Gained IPv6LL May 17 00:41:14.652963 env[1739]: time="2025-05-17T00:41:14.652908477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b4b9bd5c8-55s66,Uid:a3f52808-2a82-44e1-80ef-38473ae77d9b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a\"" May 17 00:41:15.302728 env[1739]: time="2025-05-17T00:41:15.302668715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:15.304840 env[1739]: time="2025-05-17T00:41:15.304792512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:15.306652 env[1739]: time="2025-05-17T00:41:15.306620906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:15.308214 env[1739]: time="2025-05-17T00:41:15.308180913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:15.308827 env[1739]: time="2025-05-17T00:41:15.308799373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:41:15.317616 env[1739]: time="2025-05-17T00:41:15.317528415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:41:15.319847 env[1739]: time="2025-05-17T00:41:15.319786458Z" level=info msg="CreateContainer within sandbox \"30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:41:15.340014 systemd-networkd[1462]: cali06ff4f894e4: Gained IPv6LL May 17 00:41:15.344076 env[1739]: time="2025-05-17T00:41:15.344027220Z" level=info msg="CreateContainer within sandbox \"30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e0c2389bd9059bc6c0211ef2c09c04981662d07213d925ea5d37447868dd24e7\"" May 17 00:41:15.344789 env[1739]: time="2025-05-17T00:41:15.344761107Z" level=info msg="StartContainer for \"e0c2389bd9059bc6c0211ef2c09c04981662d07213d925ea5d37447868dd24e7\"" May 17 00:41:15.376390 systemd[1]: Started cri-containerd-e0c2389bd9059bc6c0211ef2c09c04981662d07213d925ea5d37447868dd24e7.scope. May 17 00:41:15.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.397000 audit: BPF prog-id=204 op=LOAD May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4571 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:15.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633233383962643930353962633663303231316566326330396330 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4571 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:15.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633233383962643930353962633663303231316566326330396330 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit: BPF prog-id=205 op=LOAD May 17 00:41:15.398000 audit[5132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022a800 items=0 ppid=4571 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:15.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633233383962643930353962633663303231316566326330396330 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit: BPF prog-id=206 op=LOAD May 17 00:41:15.398000 audit[5132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022a848 items=0 ppid=4571 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:15.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633233383962643930353962633663303231316566326330396330 May 17 00:41:15.398000 audit: BPF prog-id=206 op=UNLOAD May 17 00:41:15.398000 audit: BPF prog-id=205 op=UNLOAD May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { perfmon } for pid=5132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit[5132]: AVC avc: denied { bpf } for pid=5132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:15.398000 audit: BPF prog-id=207 op=LOAD May 17 00:41:15.398000 audit[5132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022ac58 items=0 ppid=4571 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:15.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633233383962643930353962633663303231316566326330396330 May 17 00:41:15.434435 env[1739]: time="2025-05-17T00:41:15.434387357Z" level=info msg="StartContainer for \"e0c2389bd9059bc6c0211ef2c09c04981662d07213d925ea5d37447868dd24e7\" returns successfully" May 17 00:41:15.717795 systemd-networkd[1462]: calibe80a16303a: Gained IPv6LL May 17 00:41:16.054000 audit[4938]: AVC avc: denied { getattr } for pid=4938 comm="coredns" path="cgroup:[4026532730]" dev="nsfs" ino=4026532730 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c888 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:41:16.054000 audit[4938]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4e08 a3=0 items=0 ppid=4820 pid=4938 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c888 key=(null) May 17 00:41:16.054000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:41:16.054000 audit[4925]: AVC avc: denied { getattr } for pid=4925 comm="coredns" path="cgroup:[4026532727]" dev="nsfs" ino=4026532727 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c842 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:41:16.054000 audit[4925]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a798 a2=c0004d8b98 a3=0 items=0 ppid=4775 pid=4925 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c842 key=(null) May 17 00:41:16.054000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:41:16.310915 kubelet[2612]: I0517 00:41:16.310788 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-ncxj8" podStartSLOduration=32.054201224 podStartE2EDuration="36.310770225s" podCreationTimestamp="2025-05-17 00:40:40 +0000 UTC" firstStartedPulling="2025-05-17 00:41:11.055281622 +0000 UTC m=+46.477586474" lastFinishedPulling="2025-05-17 00:41:15.311850612 +0000 UTC m=+50.734155475" observedRunningTime="2025-05-17 00:41:16.310608155 +0000 UTC m=+51.732913024" watchObservedRunningTime="2025-05-17 00:41:16.310770225 +0000 UTC m=+51.733075098" May 17 00:41:16.343000 audit[5166]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:16.345172 kernel: kauditd_printk_skb: 435 callbacks suppressed May 17 00:41:16.345283 kernel: audit: type=1325 audit(1747442476.343:1370): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:16.343000 audit[5166]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffa22e5f80 a2=0 a3=7fffa22e5f6c items=0 ppid=2715 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.353708 kernel: audit: type=1300 audit(1747442476.343:1370): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffa22e5f80 a2=0 a3=7fffa22e5f6c items=0 ppid=2715 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:16.360184 kernel: audit: type=1327 audit(1747442476.343:1370): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:16.361285 kernel: audit: type=1325 audit(1747442476.359:1371): table=nat:122 family=2 entries=14 op=nft_register_rule pid=5166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:16.359000 audit[5166]: NETFILTER_CFG table=nat:122 family=2 entries=14 op=nft_register_rule pid=5166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:16.368647 kernel: audit: type=1300 audit(1747442476.359:1371): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffa22e5f80 a2=0 a3=0 items=0 ppid=2715 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.359000 audit[5166]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffa22e5f80 a2=0 a3=0 items=0 ppid=2715 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:16.373480 kernel: audit: type=1327 audit(1747442476.359:1371): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:16.463000 audit[5143]: AVC avc: denied { watch } for pid=5143 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_40_56.219273776/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c939 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c173,c939 tclass=file permissive=0 May 17 00:41:16.469141 kernel: audit: type=1400 audit(1747442476.463:1372): avc: denied { watch } for pid=5143 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_40_56.219273776/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c939 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c173,c939 tclass=file permissive=0 May 17 00:41:16.463000 audit[5143]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fab0c0 a2=fc6 a3=0 items=0 ppid=4571 pid=5143 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c939 key=(null) May 17 00:41:16.476144 kernel: audit: type=1300 audit(1747442476.463:1372): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fab0c0 a2=fc6 a3=0 items=0 ppid=4571 pid=5143 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c939 key=(null) May 17 00:41:16.463000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:41:16.483164 kernel: audit: type=1327 audit(1747442476.463:1372): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:41:17.290170 kubelet[2612]: I0517 00:41:17.286669 2612 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:41:17.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.158:22-139.178.68.195:40022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:17.330191 systemd[1]: Started sshd@8-172.31.25.158:22-139.178.68.195:40022.service. May 17 00:41:17.337737 kernel: audit: type=1130 audit(1747442477.330:1373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.158:22-139.178.68.195:40022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:17.557000 audit[5175]: USER_ACCT pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:17.558000 audit[5175]: CRED_ACQ pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:17.559000 audit[5175]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb09c6f90 a2=3 a3=0 items=0 ppid=1 pid=5175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.559000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:17.573259 sshd[5175]: Accepted publickey for core from 139.178.68.195 port 40022 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:17.570039 sshd[5175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:17.584215 systemd-logind[1731]: New session 9 of user core. May 17 00:41:17.586474 systemd[1]: Started session-9.scope. May 17 00:41:17.594000 audit[5175]: USER_START pid=5175 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:17.596000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:18.332212 sshd[5175]: pam_unix(sshd:session): session closed for user core May 17 00:41:18.334000 audit[5175]: USER_END pid=5175 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:18.334000 audit[5175]: CRED_DISP pid=5175 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:18.337257 systemd-logind[1731]: Session 9 logged out. Waiting for processes to exit. May 17 00:41:18.337467 systemd[1]: sshd@8-172.31.25.158:22-139.178.68.195:40022.service: Deactivated successfully. May 17 00:41:18.338662 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:41:18.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.158:22-139.178.68.195:40022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:18.339906 systemd-logind[1731]: Removed session 9. May 17 00:41:19.085000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:19.085000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014ddd40 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:19.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:19.085000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:19.085000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001eb6ee0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:19.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:20.404000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:20.404000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014141bf0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:41:20.404000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:41:20.411000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:20.411000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0143d46f0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:41:20.411000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:41:20.419000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:20.419000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0144aa000 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:41:20.419000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:41:20.420000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:20.420000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0143d47b0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:41:20.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:41:20.436000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:20.436000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:20.436000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0143d48a0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:41:20.436000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:41:20.436000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0142975c0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:41:20.436000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:41:20.684336 env[1739]: time="2025-05-17T00:41:20.684039341Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:20.690317 env[1739]: time="2025-05-17T00:41:20.690262979Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:20.692424 env[1739]: time="2025-05-17T00:41:20.692386259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:20.695232 env[1739]: time="2025-05-17T00:41:20.695194310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:20.695763 env[1739]: time="2025-05-17T00:41:20.695730250Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:41:20.790280 env[1739]: time="2025-05-17T00:41:20.790233313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:41:21.149319 env[1739]: time="2025-05-17T00:41:21.148577212Z" level=info msg="CreateContainer within sandbox \"a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:41:21.179009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1744974536.mount: Deactivated successfully. May 17 00:41:21.188803 env[1739]: time="2025-05-17T00:41:21.188729453Z" level=info msg="CreateContainer within sandbox \"a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a\"" May 17 00:41:21.193420 env[1739]: time="2025-05-17T00:41:21.193379370Z" level=info msg="StartContainer for \"e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a\"" May 17 00:41:21.223454 systemd[1]: Started cri-containerd-e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a.scope. May 17 00:41:21.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.260000 audit: BPF prog-id=208 op=LOAD May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4620 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:21.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530316633386335336539313731386237363337343666356634663363 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4620 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:21.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530316633386335336539313731386237363337343666356634663363 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit: BPF prog-id=209 op=LOAD May 17 00:41:21.261000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000339d30 items=0 ppid=4620 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:21.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530316633386335336539313731386237363337343666356634663363 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit: BPF prog-id=210 op=LOAD May 17 00:41:21.261000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000339d78 items=0 ppid=4620 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:21.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530316633386335336539313731386237363337343666356634663363 May 17 00:41:21.261000 audit: BPF prog-id=210 op=UNLOAD May 17 00:41:21.261000 audit: BPF prog-id=209 op=UNLOAD May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:21.261000 audit: BPF prog-id=211 op=LOAD May 17 00:41:21.261000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a6188 items=0 ppid=4620 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:21.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530316633386335336539313731386237363337343666356634663363 May 17 00:41:21.311313 env[1739]: time="2025-05-17T00:41:21.311157766Z" level=info msg="StartContainer for \"e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a\" returns successfully" May 17 00:41:22.412813 env[1739]: time="2025-05-17T00:41:22.412454477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.415803 env[1739]: time="2025-05-17T00:41:22.415629744Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.419075 env[1739]: time="2025-05-17T00:41:22.419019696Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.422044 env[1739]: time="2025-05-17T00:41:22.422010390Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:41:22.423466 env[1739]: time="2025-05-17T00:41:22.423416721Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.429992 env[1739]: time="2025-05-17T00:41:22.429951883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:41:22.435167 env[1739]: time="2025-05-17T00:41:22.435056422Z" level=info msg="CreateContainer within sandbox \"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:41:22.475628 systemd[1]: run-containerd-runc-k8s.io-e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a-runc.PIXdXv.mount: Deactivated successfully. May 17 00:41:22.478043 kubelet[2612]: I0517 00:41:22.476422 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-577d59dd8d-5cp45" podStartSLOduration=27.81096832 podStartE2EDuration="37.453286863s" podCreationTimestamp="2025-05-17 00:40:45 +0000 UTC" firstStartedPulling="2025-05-17 00:41:11.092606164 +0000 UTC m=+46.514911027" lastFinishedPulling="2025-05-17 00:41:20.734924689 +0000 UTC m=+56.157229570" observedRunningTime="2025-05-17 00:41:22.447623008 +0000 UTC m=+57.869927882" watchObservedRunningTime="2025-05-17 00:41:22.453286863 +0000 UTC m=+57.875591729" May 17 00:41:22.491471 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount435151041.mount: Deactivated successfully. May 17 00:41:22.506362 env[1739]: time="2025-05-17T00:41:22.506303523Z" level=info msg="CreateContainer within sandbox \"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5a65cdbf5e7d5657d621c5c655685280fee36e1643ae6fa94c18369776b7ea5e\"" May 17 00:41:22.514681 env[1739]: time="2025-05-17T00:41:22.514591369Z" level=info msg="StartContainer for \"5a65cdbf5e7d5657d621c5c655685280fee36e1643ae6fa94c18369776b7ea5e\"" May 17 00:41:22.545865 systemd[1]: Started cri-containerd-5a65cdbf5e7d5657d621c5c655685280fee36e1643ae6fa94c18369776b7ea5e.scope. May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.584596 kernel: kauditd_printk_skb: 91 callbacks suppressed May 17 00:41:22.586691 kernel: audit: type=1400 audit(1747442482.581:1408): avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.599006 kernel: audit: type=1300 audit(1747442482.581:1408): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7efd94056b18 items=0 ppid=4982 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.581000 audit[5266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7efd94056b18 items=0 ppid=4982 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363563646266356537643536353764363231633563363535363835 May 17 00:41:22.610137 kernel: audit: type=1327 audit(1747442482.581:1408): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363563646266356537643536353764363231633563363535363835 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.621134 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.629317 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.637843 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.650235 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.664677 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.664824 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.673261 kernel: audit: type=1400 audit(1747442482.581:1409): avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit: BPF prog-id=212 op=LOAD May 17 00:41:22.581000 audit[5266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000310af8 items=0 ppid=4982 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363563646266356537643536353764363231633563363535363835 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit: BPF prog-id=213 op=LOAD May 17 00:41:22.581000 audit[5266]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000310b48 items=0 ppid=4982 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363563646266356537643536353764363231633563363535363835 May 17 00:41:22.581000 audit: BPF prog-id=213 op=UNLOAD May 17 00:41:22.581000 audit: BPF prog-id=212 op=UNLOAD May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { perfmon } for pid=5266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit[5266]: AVC avc: denied { bpf } for pid=5266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.581000 audit: BPF prog-id=214 op=LOAD May 17 00:41:22.581000 audit[5266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000310bd8 items=0 ppid=4982 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363563646266356537643536353764363231633563363535363835 May 17 00:41:22.679517 env[1739]: time="2025-05-17T00:41:22.677200121Z" level=info msg="StartContainer for \"5a65cdbf5e7d5657d621c5c655685280fee36e1643ae6fa94c18369776b7ea5e\" returns successfully" May 17 00:41:22.738820 env[1739]: time="2025-05-17T00:41:22.738771848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.742930 env[1739]: time="2025-05-17T00:41:22.742875572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.746029 env[1739]: time="2025-05-17T00:41:22.745986399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.749026 env[1739]: time="2025-05-17T00:41:22.748986759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:22.749603 env[1739]: time="2025-05-17T00:41:22.749491526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:41:22.750989 env[1739]: time="2025-05-17T00:41:22.750962067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:41:22.753277 env[1739]: time="2025-05-17T00:41:22.753243453Z" level=info msg="CreateContainer within sandbox \"5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:41:22.779296 env[1739]: time="2025-05-17T00:41:22.779236771Z" level=info msg="CreateContainer within sandbox \"5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"096cc99b7d5f8b1b62fc4ea0e03f928067c63091f7602e915f98730d72b2ce8f\"" May 17 00:41:22.780726 env[1739]: time="2025-05-17T00:41:22.780044638Z" level=info msg="StartContainer for \"096cc99b7d5f8b1b62fc4ea0e03f928067c63091f7602e915f98730d72b2ce8f\"" May 17 00:41:22.800889 systemd[1]: Started cri-containerd-096cc99b7d5f8b1b62fc4ea0e03f928067c63091f7602e915f98730d72b2ce8f.scope. May 17 00:41:22.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit: BPF prog-id=215 op=LOAD May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=5086 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039366363393962376435663862316236326663346561306530336639 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=5086 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039366363393962376435663862316236326663346561306530336639 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit: BPF prog-id=216 op=LOAD May 17 00:41:22.827000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00023bb20 items=0 ppid=5086 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039366363393962376435663862316236326663346561306530336639 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.827000 audit: BPF prog-id=217 op=LOAD May 17 00:41:22.827000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00023bb68 items=0 ppid=5086 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039366363393962376435663862316236326663346561306530336639 May 17 00:41:22.827000 audit: BPF prog-id=217 op=UNLOAD May 17 00:41:22.827000 audit: BPF prog-id=216 op=UNLOAD May 17 00:41:22.828000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:22.828000 audit: BPF prog-id=218 op=LOAD May 17 00:41:22.828000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00023bf78 items=0 ppid=5086 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:22.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039366363393962376435663862316236326663346561306530336639 May 17 00:41:22.867416 env[1739]: time="2025-05-17T00:41:22.867344273Z" level=info msg="StartContainer for \"096cc99b7d5f8b1b62fc4ea0e03f928067c63091f7602e915f98730d72b2ce8f\" returns successfully" May 17 00:41:22.943296 env[1739]: time="2025-05-17T00:41:22.939773557Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:22.943296 env[1739]: time="2025-05-17T00:41:22.942278783Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:22.947805 kubelet[2612]: E0517 00:41:22.947719 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:22.950339 kubelet[2612]: E0517 00:41:22.950273 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:22.950919 env[1739]: time="2025-05-17T00:41:22.950880755Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:41:22.957152 kubelet[2612]: E0517 00:41:22.957062 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-j9lf9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vpk7m_calico-system(bdc4c222-6e91-430d-bb4e-7e63d4524888): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:22.959293 kubelet[2612]: E0517 00:41:22.959250 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:41:23.361886 systemd[1]: Started sshd@9-172.31.25.158:22-139.178.68.195:40028.service. May 17 00:41:23.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.158:22-139.178.68.195:40028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:23.599000 audit[5340]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:23.599000 audit[5340]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcd5c92400 a2=0 a3=7ffcd5c923ec items=0 ppid=2715 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:23.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:23.605000 audit[5340]: NETFILTER_CFG table=nat:124 family=2 entries=14 op=nft_register_rule pid=5340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:23.605000 audit[5340]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcd5c92400 a2=0 a3=0 items=0 ppid=2715 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:23.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:23.654000 audit[5337]: USER_ACCT pid=5337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:23.656000 audit[5337]: CRED_ACQ pid=5337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:23.656000 audit[5337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff057283d0 a2=3 a3=0 items=0 ppid=1 pid=5337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:23.656000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:23.660347 sshd[5337]: Accepted publickey for core from 139.178.68.195 port 40028 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:23.661613 sshd[5337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:23.672405 systemd[1]: Started session-10.scope. May 17 00:41:23.673157 systemd-logind[1731]: New session 10 of user core. May 17 00:41:23.679000 audit[5337]: USER_START pid=5337 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:23.681000 audit[5341]: CRED_ACQ pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:24.649266 sshd[5337]: pam_unix(sshd:session): session closed for user core May 17 00:41:24.650000 audit[5337]: USER_END pid=5337 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:24.650000 audit[5337]: CRED_DISP pid=5337 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:24.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.158:22-139.178.68.195:40028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:24.654331 systemd[1]: sshd@9-172.31.25.158:22-139.178.68.195:40028.service: Deactivated successfully. May 17 00:41:24.655474 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:41:24.658996 systemd-logind[1731]: Session 10 logged out. Waiting for processes to exit. May 17 00:41:24.660245 systemd-logind[1731]: Removed session 10. May 17 00:41:24.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.158:22-139.178.68.195:35228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:24.676195 systemd[1]: Started sshd@10-172.31.25.158:22-139.178.68.195:35228.service. May 17 00:41:24.882000 audit[5314]: AVC avc: denied { watch } for pid=5314 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_40_56.1018337499/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c629 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c234,c629 tclass=file permissive=0 May 17 00:41:24.882000 audit[5314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008588c0 a2=fc6 a3=0 items=0 ppid=5086 pid=5314 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c629 key=(null) May 17 00:41:24.882000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:41:24.891000 audit[5357]: USER_ACCT pid=5357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:24.893260 sshd[5357]: Accepted publickey for core from 139.178.68.195 port 35228 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:24.892000 audit[5357]: CRED_ACQ pid=5357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:24.892000 audit[5357]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda98df560 a2=3 a3=0 items=0 ppid=1 pid=5357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:24.892000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:24.896610 sshd[5357]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:24.919484 systemd[1]: Started session-11.scope. May 17 00:41:24.920473 systemd-logind[1731]: New session 11 of user core. May 17 00:41:24.927000 audit[5357]: USER_START pid=5357 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:24.929000 audit[5360]: CRED_ACQ pid=5360 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:25.307639 env[1739]: time="2025-05-17T00:41:25.306468053Z" level=info msg="StopPodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\"" May 17 00:41:25.329738 kubelet[2612]: I0517 00:41:25.329349 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b4b9bd5c8-55s66" podStartSLOduration=37.225621809 podStartE2EDuration="45.321221946s" podCreationTimestamp="2025-05-17 00:40:40 +0000 UTC" firstStartedPulling="2025-05-17 00:41:14.654895326 +0000 UTC m=+50.077200192" lastFinishedPulling="2025-05-17 00:41:22.750495466 +0000 UTC m=+58.172800329" observedRunningTime="2025-05-17 00:41:23.450212969 +0000 UTC m=+58.872517846" watchObservedRunningTime="2025-05-17 00:41:25.321221946 +0000 UTC m=+60.743526812" May 17 00:41:25.456000 audit[5378]: NETFILTER_CFG table=filter:125 family=2 entries=19 op=nft_register_rule pid=5378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:25.456000 audit[5378]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff9f22b820 a2=0 a3=7fff9f22b80c items=0 ppid=2715 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:25.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:25.465000 audit[5378]: NETFILTER_CFG table=nat:126 family=2 entries=21 op=nft_register_chain pid=5378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:25.465000 audit[5378]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7fff9f22b820 a2=0 a3=7fff9f22b80c items=0 ppid=2715 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:25.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.127646 sshd[5357]: pam_unix(sshd:session): session closed for user core May 17 00:41:26.131000 audit[5357]: USER_END pid=5357 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.132000 audit[5357]: CRED_DISP pid=5357 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.158:22-139.178.68.195:35240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.158:22-139.178.68.195:35228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.146627 systemd[1]: Started sshd@11-172.31.25.158:22-139.178.68.195:35240.service. May 17 00:41:26.149083 systemd[1]: sshd@10-172.31.25.158:22-139.178.68.195:35228.service: Deactivated successfully. May 17 00:41:26.151717 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:41:26.155555 systemd-logind[1731]: Session 11 logged out. Waiting for processes to exit. May 17 00:41:26.158167 systemd-logind[1731]: Removed session 11. May 17 00:41:26.366000 audit[5392]: USER_ACCT pid=5392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.369271 sshd[5392]: Accepted publickey for core from 139.178.68.195 port 35240 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:26.370000 audit[5392]: CRED_ACQ pid=5392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.370000 audit[5392]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca5f63510 a2=3 a3=0 items=0 ppid=1 pid=5392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:26.371000 audit[5397]: NETFILTER_CFG table=filter:127 family=2 entries=15 op=nft_register_rule pid=5397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.371000 audit[5397]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffff562aad0 a2=0 a3=7ffff562aabc items=0 ppid=2715 pid=5397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.389000 audit[5397]: NETFILTER_CFG table=nat:128 family=2 entries=37 op=nft_register_chain pid=5397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.389000 audit[5397]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffff562aad0 a2=0 a3=7ffff562aabc items=0 ppid=2715 pid=5397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.397000 audit[5392]: USER_START pid=5392 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.399000 audit[5398]: CRED_ACQ pid=5398 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.386464 systemd[1]: Started session-12.scope. May 17 00:41:26.374674 sshd[5392]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:26.387505 systemd-logind[1731]: New session 12 of user core. May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:25.899 [WARNING][5377] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:25.903 [INFO][5377] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:25.903 [INFO][5377] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" iface="eth0" netns="" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:25.903 [INFO][5377] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:25.903 [INFO][5377] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.295 [INFO][5385] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.304 [INFO][5385] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.304 [INFO][5385] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.361 [WARNING][5385] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.361 [INFO][5385] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.410 [INFO][5385] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:26.415858 env[1739]: 2025-05-17 00:41:26.412 [INFO][5377] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:26.417925 env[1739]: time="2025-05-17T00:41:26.416996980Z" level=info msg="TearDown network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" successfully" May 17 00:41:26.417925 env[1739]: time="2025-05-17T00:41:26.417039206Z" level=info msg="StopPodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" returns successfully" May 17 00:41:26.451251 env[1739]: time="2025-05-17T00:41:26.450591209Z" level=info msg="RemovePodSandbox for \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\"" May 17 00:41:26.451251 env[1739]: time="2025-05-17T00:41:26.450642751Z" level=info msg="Forcibly stopping sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\"" May 17 00:41:26.560000 audit[5416]: NETFILTER_CFG table=filter:129 family=2 entries=12 op=nft_register_rule pid=5416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.560000 audit[5416]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc06bd6730 a2=0 a3=7ffc06bd671c items=0 ppid=2715 pid=5416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.624000 audit[5416]: NETFILTER_CFG table=nat:130 family=2 entries=58 op=nft_register_chain pid=5416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.624000 audit[5416]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffc06bd6730 a2=0 a3=7ffc06bd671c items=0 ppid=2715 pid=5416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.916015 sshd[5392]: pam_unix(sshd:session): session closed for user core May 17 00:41:26.916000 audit[5392]: USER_END pid=5392 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.917000 audit[5392]: CRED_DISP pid=5392 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:26.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.158:22-139.178.68.195:35240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:26.920184 systemd[1]: sshd@11-172.31.25.158:22-139.178.68.195:35240.service: Deactivated successfully. May 17 00:41:26.921510 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:41:26.924942 systemd-logind[1731]: Session 12 logged out. Waiting for processes to exit. May 17 00:41:26.927541 systemd-logind[1731]: Removed session 12. May 17 00:41:27.232703 env[1739]: time="2025-05-17T00:41:27.232583949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.238067 env[1739]: time="2025-05-17T00:41:27.238031062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.241528 env[1739]: time="2025-05-17T00:41:27.241481930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.244516 env[1739]: time="2025-05-17T00:41:27.244480065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.244874 env[1739]: time="2025-05-17T00:41:27.244841035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:41:27.349055 env[1739]: time="2025-05-17T00:41:27.349008833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:41:27.387061 env[1739]: time="2025-05-17T00:41:27.387012126Z" level=info msg="CreateContainer within sandbox \"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.056 [WARNING][5415] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" WorkloadEndpoint="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.061 [INFO][5415] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.061 [INFO][5415] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" iface="eth0" netns="" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.061 [INFO][5415] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.061 [INFO][5415] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.385 [INFO][5427] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.385 [INFO][5427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.386 [INFO][5427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.398 [WARNING][5427] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.398 [INFO][5427] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" HandleID="k8s-pod-network.df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" Workload="ip--172--31--25--158-k8s-whisker--f87869957--bljjj-eth0" May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.400 [INFO][5427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:27.405786 env[1739]: 2025-05-17 00:41:27.403 [INFO][5415] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336" May 17 00:41:27.410000 env[1739]: time="2025-05-17T00:41:27.406415715Z" level=info msg="TearDown network for sandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" successfully" May 17 00:41:27.421083 env[1739]: time="2025-05-17T00:41:27.420580085Z" level=info msg="RemovePodSandbox \"df24ca5afe0ca283dbe26fec7c0f9d6a408c156afa4bd58018be6394d8a95336\" returns successfully" May 17 00:41:27.424524 env[1739]: time="2025-05-17T00:41:27.424475691Z" level=info msg="StopPodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\"" May 17 00:41:27.425507 env[1739]: time="2025-05-17T00:41:27.425466623Z" level=info msg="CreateContainer within sandbox \"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"556f2f461c18f9cbe4aad2b83699b68263de8cb76bd8ab1ab953a5409be5c30b\"" May 17 00:41:27.427619 env[1739]: time="2025-05-17T00:41:27.427592424Z" level=info msg="StartContainer for \"556f2f461c18f9cbe4aad2b83699b68263de8cb76bd8ab1ab953a5409be5c30b\"" May 17 00:41:27.480784 systemd[1]: Started cri-containerd-556f2f461c18f9cbe4aad2b83699b68263de8cb76bd8ab1ab953a5409be5c30b.scope. May 17 00:41:27.497733 systemd[1]: run-containerd-runc-k8s.io-556f2f461c18f9cbe4aad2b83699b68263de8cb76bd8ab1ab953a5409be5c30b-runc.NB3Fb4.mount: Deactivated successfully. May 17 00:41:27.554713 env[1739]: time="2025-05-17T00:41:27.554657740Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:27.557774 env[1739]: time="2025-05-17T00:41:27.557714654Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002176b0 a2=3c a3=7fa6e41804a8 items=0 ppid=4982 pid=5456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366632663436316331386639636265346161643262383336393962 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit: BPF prog-id=219 op=LOAD May 17 00:41:27.571000 audit[5456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0002179d8 a2=78 a3=c00034bb88 items=0 ppid=4982 pid=5456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366632663436316331386639636265346161643262383336393962 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.571000 audit: BPF prog-id=220 op=LOAD May 17 00:41:27.571000 audit[5456]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000217770 a2=78 a3=c00034bbd8 items=0 ppid=4982 pid=5456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366632663436316331386639636265346161643262383336393962 May 17 00:41:27.573000 audit: BPF prog-id=220 op=UNLOAD May 17 00:41:27.573000 audit: BPF prog-id=219 op=UNLOAD May 17 00:41:27.573000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { perfmon } for pid=5456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit[5456]: AVC avc: denied { bpf } for pid=5456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.573000 audit: BPF prog-id=221 op=LOAD May 17 00:41:27.573000 audit[5456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000217c30 a2=78 a3=c00034bc68 items=0 ppid=4982 pid=5456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366632663436316331386639636265346161643262383336393962 May 17 00:41:27.595307 kubelet[2612]: E0517 00:41:27.593911 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:27.622406 kubelet[2612]: E0517 00:41:27.622364 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:27.623179 env[1739]: time="2025-05-17T00:41:27.623102898Z" level=info msg="StartContainer for \"556f2f461c18f9cbe4aad2b83699b68263de8cb76bd8ab1ab953a5409be5c30b\" returns successfully" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.525 [WARNING][5451] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"5fe1896b-fa6b-4c91-abac-c9f76ba079a0", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f", Pod:"coredns-668d6bf9bc-h4plp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f423c65bf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.528 [INFO][5451] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.528 [INFO][5451] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" iface="eth0" netns="" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.528 [INFO][5451] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.528 [INFO][5451] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.605 [INFO][5473] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.606 [INFO][5473] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.606 [INFO][5473] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.614 [WARNING][5473] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.615 [INFO][5473] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.621 [INFO][5473] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:27.629670 env[1739]: 2025-05-17 00:41:27.624 [INFO][5451] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.629670 env[1739]: time="2025-05-17T00:41:27.629277827Z" level=info msg="TearDown network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" successfully" May 17 00:41:27.629670 env[1739]: time="2025-05-17T00:41:27.629316321Z" level=info msg="StopPodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" returns successfully" May 17 00:41:27.637282 env[1739]: time="2025-05-17T00:41:27.637241044Z" level=info msg="RemovePodSandbox for \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\"" May 17 00:41:27.637452 env[1739]: time="2025-05-17T00:41:27.637285751Z" level=info msg="Forcibly stopping sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\"" May 17 00:41:27.656754 kubelet[2612]: E0517 00:41:27.656652 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:56dc55be560a4f65a779449400a59c49,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:27.660399 env[1739]: time="2025-05-17T00:41:27.659554400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:41:27.686233 kernel: kauditd_printk_skb: 193 callbacks suppressed May 17 00:41:27.714070 kernel: audit: type=1400 audit(1747442487.675:1474): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.723599 kernel: audit: type=1300 audit(1747442487.675:1474): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007777a0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.723685 kernel: audit: type=1327 audit(1747442487.675:1474): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.723713 kernel: audit: type=1400 audit(1747442487.675:1475): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.723736 kernel: audit: type=1300 audit(1747442487.675:1475): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001354420 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.733314 kernel: audit: type=1327 audit(1747442487.675:1475): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.675000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.675000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007777a0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.675000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.675000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001354420 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.698000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.747287 kernel: audit: type=1400 audit(1747442487.698:1476): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.698000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000777880 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.758133 kernel: audit: type=1300 audit(1747442487.698:1476): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000777880 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.778325 kernel: audit: type=1327 audit(1747442487.698:1476): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.698000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.789236 kernel: audit: type=1400 audit(1747442487.698:1477): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:27.698000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007778c0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:41:27.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.731 [WARNING][5500] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"5fe1896b-fa6b-4c91-abac-c9f76ba079a0", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"1059fc1937512a7722ea28c269b35edcdb18caec82e1b23024cae362f256e29f", Pod:"coredns-668d6bf9bc-h4plp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f423c65bf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.731 [INFO][5500] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.732 [INFO][5500] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" iface="eth0" netns="" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.732 [INFO][5500] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.732 [INFO][5500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.782 [INFO][5507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.784 [INFO][5507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.784 [INFO][5507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.794 [WARNING][5507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.794 [INFO][5507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" HandleID="k8s-pod-network.63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--h4plp-eth0" May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.796 [INFO][5507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:27.805257 env[1739]: 2025-05-17 00:41:27.802 [INFO][5500] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719" May 17 00:41:27.806810 env[1739]: time="2025-05-17T00:41:27.806279572Z" level=info msg="TearDown network for sandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" successfully" May 17 00:41:27.812551 env[1739]: time="2025-05-17T00:41:27.812486370Z" level=info msg="RemovePodSandbox \"63eed1ad3d8bb9570b6a2f71fd2ce18ce1aa5c6028c762222c0f02d0b21e9719\" returns successfully" May 17 00:41:27.813405 env[1739]: time="2025-05-17T00:41:27.813374534Z" level=info msg="StopPodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\"" May 17 00:41:27.854826 kubelet[2612]: I0517 00:41:27.850735 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-q5bk6" podStartSLOduration=30.453526903 podStartE2EDuration="43.845691594s" podCreationTimestamp="2025-05-17 00:40:44 +0000 UTC" firstStartedPulling="2025-05-17 00:41:13.855188623 +0000 UTC m=+49.277493488" lastFinishedPulling="2025-05-17 00:41:27.247353316 +0000 UTC m=+62.669658179" observedRunningTime="2025-05-17 00:41:27.843716497 +0000 UTC m=+63.266021370" watchObservedRunningTime="2025-05-17 00:41:27.845691594 +0000 UTC m=+63.267996465" May 17 00:41:27.887590 env[1739]: time="2025-05-17T00:41:27.887522613Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:27.889647 env[1739]: time="2025-05-17T00:41:27.889590348Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:27.890184 kubelet[2612]: E0517 00:41:27.890152 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:27.890326 kubelet[2612]: E0517 00:41:27.890312 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:27.891360 kubelet[2612]: E0517 00:41:27.890481 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:27.895490 kubelet[2612]: E0517 00:41:27.895440 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.886 [WARNING][5522] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a", Pod:"coredns-668d6bf9bc-6zzbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia80c6a3ef48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.887 [INFO][5522] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.887 [INFO][5522] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" iface="eth0" netns="" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.887 [INFO][5522] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.887 [INFO][5522] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.939 [INFO][5533] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.939 [INFO][5533] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.939 [INFO][5533] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.947 [WARNING][5533] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.947 [INFO][5533] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.951 [INFO][5533] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:27.965341 env[1739]: 2025-05-17 00:41:27.956 [INFO][5522] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:27.966666 env[1739]: time="2025-05-17T00:41:27.966619146Z" level=info msg="TearDown network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" successfully" May 17 00:41:27.966832 env[1739]: time="2025-05-17T00:41:27.966810686Z" level=info msg="StopPodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" returns successfully" May 17 00:41:27.984349 env[1739]: time="2025-05-17T00:41:27.983394912Z" level=info msg="RemovePodSandbox for \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\"" May 17 00:41:27.984349 env[1739]: time="2025-05-17T00:41:27.983434070Z" level=info msg="Forcibly stopping sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\"" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.084 [WARNING][5547] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8e5acfaf-22f8-46b4-9f3c-8f4ec1a47287", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"a6e3145bb7469345ed983c4d7e14f1b8028b7e2a00b82d4f73e03a6486bbf04a", Pod:"coredns-668d6bf9bc-6zzbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.111.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia80c6a3ef48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.085 [INFO][5547] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.085 [INFO][5547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" iface="eth0" netns="" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.085 [INFO][5547] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.085 [INFO][5547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.156 [INFO][5554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.156 [INFO][5554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.157 [INFO][5554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.181 [WARNING][5554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.182 [INFO][5554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" HandleID="k8s-pod-network.01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" Workload="ip--172--31--25--158-k8s-coredns--668d6bf9bc--6zzbw-eth0" May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.184 [INFO][5554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:28.192283 env[1739]: 2025-05-17 00:41:28.188 [INFO][5547] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769" May 17 00:41:28.193794 env[1739]: time="2025-05-17T00:41:28.193248817Z" level=info msg="TearDown network for sandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" successfully" May 17 00:41:28.195437 kubelet[2612]: I0517 00:41:28.191334 2612 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:41:28.195680 kubelet[2612]: I0517 00:41:28.195463 2612 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:41:28.222940 env[1739]: time="2025-05-17T00:41:28.222866818Z" level=info msg="RemovePodSandbox \"01a85276d894d0fe010e810e32b1f880cbccd8510394fbadb80fc47894ffc769\" returns successfully" May 17 00:41:28.224013 env[1739]: time="2025-05-17T00:41:28.223978731Z" level=info msg="StopPodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\"" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.298 [WARNING][5570] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0", GenerateName:"calico-kube-controllers-577d59dd8d-", Namespace:"calico-system", SelfLink:"", UID:"0106ba82-539e-49ae-85cf-21d470967512", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"577d59dd8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5", Pod:"calico-kube-controllers-577d59dd8d-5cp45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31c15d4cea7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.298 [INFO][5570] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.299 [INFO][5570] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" iface="eth0" netns="" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.299 [INFO][5570] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.299 [INFO][5570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.348 [INFO][5577] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.349 [INFO][5577] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.349 [INFO][5577] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.360 [WARNING][5577] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.360 [INFO][5577] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.362 [INFO][5577] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:28.368412 env[1739]: 2025-05-17 00:41:28.365 [INFO][5570] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.369218 env[1739]: time="2025-05-17T00:41:28.368465884Z" level=info msg="TearDown network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" successfully" May 17 00:41:28.369218 env[1739]: time="2025-05-17T00:41:28.368503619Z" level=info msg="StopPodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" returns successfully" May 17 00:41:28.369528 env[1739]: time="2025-05-17T00:41:28.369367236Z" level=info msg="RemovePodSandbox for \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\"" May 17 00:41:28.369528 env[1739]: time="2025-05-17T00:41:28.369409059Z" level=info msg="Forcibly stopping sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\"" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.440 [WARNING][5593] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0", GenerateName:"calico-kube-controllers-577d59dd8d-", Namespace:"calico-system", SelfLink:"", UID:"0106ba82-539e-49ae-85cf-21d470967512", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"577d59dd8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"a15d2ef7a0012c1f0514a377e5ff1bbf8bf5dc4e986be24b8bb9de7a62add7b5", Pod:"calico-kube-controllers-577d59dd8d-5cp45", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.111.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31c15d4cea7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.441 [INFO][5593] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.441 [INFO][5593] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" iface="eth0" netns="" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.441 [INFO][5593] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.441 [INFO][5593] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.493 [INFO][5600] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.493 [INFO][5600] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.493 [INFO][5600] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.506 [WARNING][5600] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.506 [INFO][5600] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" HandleID="k8s-pod-network.d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" Workload="ip--172--31--25--158-k8s-calico--kube--controllers--577d59dd8d--5cp45-eth0" May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.513 [INFO][5600] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:28.518717 env[1739]: 2025-05-17 00:41:28.516 [INFO][5593] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d" May 17 00:41:28.518717 env[1739]: time="2025-05-17T00:41:28.518687428Z" level=info msg="TearDown network for sandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" successfully" May 17 00:41:28.525412 env[1739]: time="2025-05-17T00:41:28.525375312Z" level=info msg="RemovePodSandbox \"d317245bf2808bc121b5d79bcdcf74c5cdbca9d615c04872a82d9b0b3212793d\" returns successfully" May 17 00:41:28.526272 env[1739]: time="2025-05-17T00:41:28.526248974Z" level=info msg="StopPodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\"" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.580 [WARNING][5617] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"bdc4c222-6e91-430d-bb4e-7e63d4524888", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb", Pod:"goldmane-78d55f7ddc-vpk7m", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0e9ba9848c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.580 [INFO][5617] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.581 [INFO][5617] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" iface="eth0" netns="" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.581 [INFO][5617] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.581 [INFO][5617] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.630 [INFO][5624] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.630 [INFO][5624] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.631 [INFO][5624] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.639 [WARNING][5624] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.639 [INFO][5624] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.642 [INFO][5624] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:28.646733 env[1739]: 2025-05-17 00:41:28.644 [INFO][5617] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.648470 env[1739]: time="2025-05-17T00:41:28.646736292Z" level=info msg="TearDown network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" successfully" May 17 00:41:28.648470 env[1739]: time="2025-05-17T00:41:28.646773668Z" level=info msg="StopPodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" returns successfully" May 17 00:41:28.648470 env[1739]: time="2025-05-17T00:41:28.647427950Z" level=info msg="RemovePodSandbox for \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\"" May 17 00:41:28.648470 env[1739]: time="2025-05-17T00:41:28.647467661Z" level=info msg="Forcibly stopping sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\"" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.706 [WARNING][5640] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"bdc4c222-6e91-430d-bb4e-7e63d4524888", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"887ebafb5421f040805ca9ba15647afc161201eddfd8da8925bdf062a5d824fb", Pod:"goldmane-78d55f7ddc-vpk7m", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0e9ba9848c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.706 [INFO][5640] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.706 [INFO][5640] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" iface="eth0" netns="" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.707 [INFO][5640] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.707 [INFO][5640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.748 [INFO][5647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.748 [INFO][5647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.748 [INFO][5647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.756 [WARNING][5647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.756 [INFO][5647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" HandleID="k8s-pod-network.86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" Workload="ip--172--31--25--158-k8s-goldmane--78d55f7ddc--vpk7m-eth0" May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.759 [INFO][5647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:28.763708 env[1739]: 2025-05-17 00:41:28.761 [INFO][5640] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17" May 17 00:41:28.764612 env[1739]: time="2025-05-17T00:41:28.764548244Z" level=info msg="TearDown network for sandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" successfully" May 17 00:41:28.771959 env[1739]: time="2025-05-17T00:41:28.771765572Z" level=info msg="RemovePodSandbox \"86c1c37b04d714680c43ef4a9073fe871dd0c4f03254b99ab8d0ebd934596a17\" returns successfully" May 17 00:41:28.773547 env[1739]: time="2025-05-17T00:41:28.772391483Z" level=info msg="StopPodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\"" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.848 [WARNING][5661] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a3f52808-2a82-44e1-80ef-38473ae77d9b", ResourceVersion:"1142", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a", Pod:"calico-apiserver-6b4b9bd5c8-55s66", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibe80a16303a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.849 [INFO][5661] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.849 [INFO][5661] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" iface="eth0" netns="" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.849 [INFO][5661] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.849 [INFO][5661] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.889 [INFO][5668] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.890 [INFO][5668] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.890 [INFO][5668] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.899 [WARNING][5668] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.900 [INFO][5668] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.902 [INFO][5668] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:28.908915 env[1739]: 2025-05-17 00:41:28.906 [INFO][5661] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:28.909743 env[1739]: time="2025-05-17T00:41:28.908950258Z" level=info msg="TearDown network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" successfully" May 17 00:41:28.909743 env[1739]: time="2025-05-17T00:41:28.909007964Z" level=info msg="StopPodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" returns successfully" May 17 00:41:28.910052 env[1739]: time="2025-05-17T00:41:28.910027134Z" level=info msg="RemovePodSandbox for \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\"" May 17 00:41:28.910278 env[1739]: time="2025-05-17T00:41:28.910217232Z" level=info msg="Forcibly stopping sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\"" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:28.960 [WARNING][5682] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a3f52808-2a82-44e1-80ef-38473ae77d9b", ResourceVersion:"1142", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"5e0df2752fa33e7bb36fd61d1401ee616a4be7e5970da2365f6fc7b5f3226c3a", Pod:"calico-apiserver-6b4b9bd5c8-55s66", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibe80a16303a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:28.960 [INFO][5682] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:28.960 [INFO][5682] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" iface="eth0" netns="" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:28.960 [INFO][5682] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:28.961 [INFO][5682] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.001 [INFO][5689] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.002 [INFO][5689] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.002 [INFO][5689] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.014 [WARNING][5689] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.014 [INFO][5689] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" HandleID="k8s-pod-network.f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--55s66-eth0" May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.016 [INFO][5689] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:29.021004 env[1739]: 2025-05-17 00:41:29.018 [INFO][5682] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4" May 17 00:41:29.023035 env[1739]: time="2025-05-17T00:41:29.021039632Z" level=info msg="TearDown network for sandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" successfully" May 17 00:41:29.028723 env[1739]: time="2025-05-17T00:41:29.028561631Z" level=info msg="RemovePodSandbox \"f31703b418a8d40263e6b0bfe942b596af442abd7f861446627f580f83a1b1d4\" returns successfully" May 17 00:41:29.029520 env[1739]: time="2025-05-17T00:41:29.029483405Z" level=info msg="StopPodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\"" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.082 [WARNING][5704] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"b7d1186a-bf30-4dec-8152-532be5293024", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209", Pod:"calico-apiserver-6b4b9bd5c8-ncxj8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8c938fbd1a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.083 [INFO][5704] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.083 [INFO][5704] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" iface="eth0" netns="" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.083 [INFO][5704] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.083 [INFO][5704] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.111 [INFO][5711] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.111 [INFO][5711] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.111 [INFO][5711] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.122 [WARNING][5711] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.123 [INFO][5711] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.124 [INFO][5711] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:29.136276 env[1739]: 2025-05-17 00:41:29.131 [INFO][5704] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.137674 env[1739]: time="2025-05-17T00:41:29.136416957Z" level=info msg="TearDown network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" successfully" May 17 00:41:29.137674 env[1739]: time="2025-05-17T00:41:29.136463645Z" level=info msg="StopPodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" returns successfully" May 17 00:41:29.137674 env[1739]: time="2025-05-17T00:41:29.137224030Z" level=info msg="RemovePodSandbox for \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\"" May 17 00:41:29.137674 env[1739]: time="2025-05-17T00:41:29.137263688Z" level=info msg="Forcibly stopping sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\"" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.202 [WARNING][5725] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0", GenerateName:"calico-apiserver-6b4b9bd5c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"b7d1186a-bf30-4dec-8152-532be5293024", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b4b9bd5c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"30abeda2678a1ff301ab7ea7835553d52da17cc2d3f77823a3fcbfa55bd8e209", Pod:"calico-apiserver-6b4b9bd5c8-ncxj8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.111.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8c938fbd1a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.202 [INFO][5725] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.202 [INFO][5725] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" iface="eth0" netns="" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.202 [INFO][5725] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.202 [INFO][5725] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.232 [INFO][5732] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.233 [INFO][5732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.233 [INFO][5732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.239 [WARNING][5732] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.240 [INFO][5732] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" HandleID="k8s-pod-network.a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" Workload="ip--172--31--25--158-k8s-calico--apiserver--6b4b9bd5c8--ncxj8-eth0" May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.241 [INFO][5732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:29.246356 env[1739]: 2025-05-17 00:41:29.243 [INFO][5725] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926" May 17 00:41:29.247103 env[1739]: time="2025-05-17T00:41:29.246401744Z" level=info msg="TearDown network for sandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" successfully" May 17 00:41:29.253930 env[1739]: time="2025-05-17T00:41:29.253844044Z" level=info msg="RemovePodSandbox \"a19a37cf51e365ac6b8adaab75a0a77e1750a67ed01c85b7c0b2b37b160a4926\" returns successfully" May 17 00:41:29.254949 env[1739]: time="2025-05-17T00:41:29.254905181Z" level=info msg="StopPodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\"" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.299 [WARNING][5746] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4732e8d0-52d1-4d24-aead-cc04fa7b437f", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e", Pod:"csi-node-driver-q5bk6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali06ff4f894e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.299 [INFO][5746] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.299 [INFO][5746] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" iface="eth0" netns="" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.299 [INFO][5746] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.299 [INFO][5746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.323 [INFO][5753] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.323 [INFO][5753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.323 [INFO][5753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.330 [WARNING][5753] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.330 [INFO][5753] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.332 [INFO][5753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:29.336221 env[1739]: 2025-05-17 00:41:29.334 [INFO][5746] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.340214 env[1739]: time="2025-05-17T00:41:29.336275326Z" level=info msg="TearDown network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" successfully" May 17 00:41:29.340214 env[1739]: time="2025-05-17T00:41:29.336312221Z" level=info msg="StopPodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" returns successfully" May 17 00:41:29.340214 env[1739]: time="2025-05-17T00:41:29.338249046Z" level=info msg="RemovePodSandbox for \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\"" May 17 00:41:29.340214 env[1739]: time="2025-05-17T00:41:29.338291407Z" level=info msg="Forcibly stopping sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\"" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.390 [WARNING][5767] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4732e8d0-52d1-4d24-aead-cc04fa7b437f", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-158", ContainerID:"22c9da6687abae226994269b56998a6c45baff19588faf4170fd52f0a2c1451e", Pod:"csi-node-driver-q5bk6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali06ff4f894e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.391 [INFO][5767] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.391 [INFO][5767] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" iface="eth0" netns="" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.391 [INFO][5767] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.391 [INFO][5767] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.438 [INFO][5774] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.438 [INFO][5774] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.440 [INFO][5774] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.446 [WARNING][5774] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.446 [INFO][5774] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" HandleID="k8s-pod-network.8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" Workload="ip--172--31--25--158-k8s-csi--node--driver--q5bk6-eth0" May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.448 [INFO][5774] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:29.452469 env[1739]: 2025-05-17 00:41:29.450 [INFO][5767] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0" May 17 00:41:29.454929 env[1739]: time="2025-05-17T00:41:29.452676568Z" level=info msg="TearDown network for sandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" successfully" May 17 00:41:29.459464 env[1739]: time="2025-05-17T00:41:29.459416917Z" level=info msg="RemovePodSandbox \"8ca2aa1efcee4c51b48c3e75460bbf0933c48c42b7a5304a5221f041e8b674d0\" returns successfully" May 17 00:41:31.954455 systemd[1]: Started sshd@12-172.31.25.158:22-139.178.68.195:35244.service. May 17 00:41:31.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.158:22-139.178.68.195:35244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:32.207000 audit[5790]: USER_ACCT pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:32.210000 audit[5790]: CRED_ACQ pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:32.210000 audit[5790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaa1b8460 a2=3 a3=0 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.210000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:32.220586 sshd[5790]: Accepted publickey for core from 139.178.68.195 port 35244 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:32.215088 sshd[5790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:32.236030 systemd[1]: Started session-13.scope. May 17 00:41:32.236543 systemd-logind[1731]: New session 13 of user core. May 17 00:41:32.244000 audit[5790]: USER_START pid=5790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:32.248000 audit[5792]: CRED_ACQ pid=5792 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:33.174407 sshd[5790]: pam_unix(sshd:session): session closed for user core May 17 00:41:33.179173 kernel: kauditd_printk_skb: 10 callbacks suppressed May 17 00:41:33.183435 kernel: audit: type=1106 audit(1747442493.174:1484): pid=5790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:33.174000 audit[5790]: USER_END pid=5790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:33.180517 systemd[1]: sshd@12-172.31.25.158:22-139.178.68.195:35244.service: Deactivated successfully. May 17 00:41:33.181663 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:41:33.174000 audit[5790]: CRED_DISP pid=5790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:33.184441 systemd-logind[1731]: Session 13 logged out. Waiting for processes to exit. May 17 00:41:33.186674 systemd-logind[1731]: Removed session 13. May 17 00:41:33.193156 kernel: audit: type=1104 audit(1747442493.174:1485): pid=5790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:33.193293 kernel: audit: type=1131 audit(1747442493.176:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.158:22-139.178.68.195:35244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:33.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.158:22-139.178.68.195:35244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:36.917008 kubelet[2612]: E0517 00:41:36.916912 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:41:38.203494 systemd[1]: Started sshd@13-172.31.25.158:22-139.178.68.195:35752.service. May 17 00:41:38.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.158:22-139.178.68.195:35752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.211357 kernel: audit: type=1130 audit(1747442498.203:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.158:22-139.178.68.195:35752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:38.441000 audit[5827]: USER_ACCT pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.443533 sshd[5827]: Accepted publickey for core from 139.178.68.195 port 35752 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:38.449000 audit[5827]: CRED_ACQ pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.456074 sshd[5827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:38.457340 kernel: audit: type=1101 audit(1747442498.441:1488): pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.462708 kernel: audit: type=1103 audit(1747442498.449:1489): pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.462798 kernel: audit: type=1006 audit(1747442498.450:1490): pid=5827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:41:38.450000 audit[5827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b237d70 a2=3 a3=0 items=0 ppid=1 pid=5827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.470770 kernel: audit: type=1300 audit(1747442498.450:1490): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b237d70 a2=3 a3=0 items=0 ppid=1 pid=5827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.473963 kernel: audit: type=1327 audit(1747442498.450:1490): proctitle=737368643A20636F7265205B707269765D May 17 00:41:38.450000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:38.483063 systemd[1]: Started session-14.scope. May 17 00:41:38.483565 systemd-logind[1731]: New session 14 of user core. May 17 00:41:38.491000 audit[5827]: USER_START pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.496000 audit[5829]: CRED_ACQ pid=5829 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.500787 kernel: audit: type=1105 audit(1747442498.491:1491): pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:38.500949 kernel: audit: type=1103 audit(1747442498.496:1492): pid=5829 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:39.082722 sshd[5827]: pam_unix(sshd:session): session closed for user core May 17 00:41:39.087000 audit[5827]: USER_END pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:39.090233 systemd[1]: sshd@13-172.31.25.158:22-139.178.68.195:35752.service: Deactivated successfully. May 17 00:41:39.091133 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:41:39.093467 systemd-logind[1731]: Session 14 logged out. Waiting for processes to exit. May 17 00:41:39.094651 systemd-logind[1731]: Removed session 14. May 17 00:41:39.087000 audit[5827]: CRED_DISP pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:39.102198 kernel: audit: type=1106 audit(1747442499.087:1493): pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:39.102933 kernel: audit: type=1104 audit(1747442499.087:1494): pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:39.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.158:22-139.178.68.195:35752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:40.893204 kubelet[2612]: E0517 00:41:40.893161 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:41:44.102468 systemd[1]: Started sshd@14-172.31.25.158:22-139.178.68.195:43008.service. May 17 00:41:44.110892 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:41:44.111532 kernel: audit: type=1130 audit(1747442504.101:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.158:22-139.178.68.195:43008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:44.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.158:22-139.178.68.195:43008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:44.311000 audit[5841]: USER_ACCT pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.320302 sshd[5841]: Accepted publickey for core from 139.178.68.195 port 43008 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:44.319000 audit[5841]: CRED_ACQ pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.321874 sshd[5841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:44.327667 kernel: audit: type=1101 audit(1747442504.311:1497): pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.327744 kernel: audit: type=1103 audit(1747442504.319:1498): pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.331635 kernel: audit: type=1006 audit(1747442504.319:1499): pid=5841 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:41:44.319000 audit[5841]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff83547cc0 a2=3 a3=0 items=0 ppid=1 pid=5841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.335611 systemd[1]: Started session-15.scope. May 17 00:41:44.337064 systemd-logind[1731]: New session 15 of user core. May 17 00:41:44.339475 kernel: audit: type=1300 audit(1747442504.319:1499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff83547cc0 a2=3 a3=0 items=0 ppid=1 pid=5841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:44.342537 kernel: audit: type=1327 audit(1747442504.319:1499): proctitle=737368643A20636F7265205B707269765D May 17 00:41:44.344000 audit[5841]: USER_START pid=5841 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.344000 audit[5843]: CRED_ACQ pid=5843 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.358803 kernel: audit: type=1105 audit(1747442504.344:1500): pid=5841 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.358945 kernel: audit: type=1103 audit(1747442504.344:1501): pid=5843 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.614341 sshd[5841]: pam_unix(sshd:session): session closed for user core May 17 00:41:44.614000 audit[5841]: USER_END pid=5841 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.618906 systemd[1]: sshd@14-172.31.25.158:22-139.178.68.195:43008.service: Deactivated successfully. May 17 00:41:44.619705 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:41:44.615000 audit[5841]: CRED_DISP pid=5841 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.624983 systemd-logind[1731]: Session 15 logged out. Waiting for processes to exit. May 17 00:41:44.626040 systemd-logind[1731]: Removed session 15. May 17 00:41:44.629450 kernel: audit: type=1106 audit(1747442504.614:1502): pid=5841 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.629538 kernel: audit: type=1104 audit(1747442504.615:1503): pid=5841 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:44.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.158:22-139.178.68.195:43008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:49.652810 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:41:49.653217 kernel: audit: type=1130 audit(1747442509.644:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.158:22-139.178.68.195:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:49.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.158:22-139.178.68.195:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:49.645147 systemd[1]: Started sshd@15-172.31.25.158:22-139.178.68.195:43024.service. May 17 00:41:49.909000 audit[5853]: USER_ACCT pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.920216 kernel: audit: type=1101 audit(1747442509.909:1506): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.922708 kernel: audit: type=1103 audit(1747442509.920:1507): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.920000 audit[5853]: CRED_ACQ pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.924912 sshd[5853]: Accepted publickey for core from 139.178.68.195 port 43024 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:49.927752 sshd[5853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:49.934773 kernel: audit: type=1006 audit(1747442509.920:1508): pid=5853 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:41:49.920000 audit[5853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb6806f50 a2=3 a3=0 items=0 ppid=1 pid=5853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:49.945175 kernel: audit: type=1300 audit(1747442509.920:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb6806f50 a2=3 a3=0 items=0 ppid=1 pid=5853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:49.946141 kernel: audit: type=1327 audit(1747442509.920:1508): proctitle=737368643A20636F7265205B707269765D May 17 00:41:49.920000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:49.952407 systemd[1]: Started session-16.scope. May 17 00:41:49.953760 systemd-logind[1731]: New session 16 of user core. May 17 00:41:49.964000 audit[5853]: USER_START pid=5853 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.967000 audit[5861]: CRED_ACQ pid=5861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.982322 kernel: audit: type=1105 audit(1747442509.964:1509): pid=5853 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.982497 kernel: audit: type=1103 audit(1747442509.967:1510): pid=5861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:49.984368 env[1739]: time="2025-05-17T00:41:49.984333106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:41:50.169175 env[1739]: time="2025-05-17T00:41:50.169092859Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:50.174130 env[1739]: time="2025-05-17T00:41:50.174041834Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:50.221591 kubelet[2612]: E0517 00:41:50.221457 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:50.234762 kubelet[2612]: E0517 00:41:50.234674 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:50.309844 kubelet[2612]: E0517 00:41:50.309766 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-j9lf9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vpk7m_calico-system(bdc4c222-6e91-430d-bb4e-7e63d4524888): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:50.316621 kubelet[2612]: E0517 00:41:50.316565 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:41:50.706707 sshd[5853]: pam_unix(sshd:session): session closed for user core May 17 00:41:50.707000 audit[5853]: USER_END pid=5853 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.723414 kernel: audit: type=1106 audit(1747442510.707:1511): pid=5853 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.723500 kernel: audit: type=1104 audit(1747442510.708:1512): pid=5853 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.708000 audit[5853]: CRED_DISP pid=5853 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.158:22-139.178.68.195:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.716570 systemd[1]: sshd@15-172.31.25.158:22-139.178.68.195:43024.service: Deactivated successfully. May 17 00:41:50.717412 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:41:50.718737 systemd-logind[1731]: Session 16 logged out. Waiting for processes to exit. May 17 00:41:50.719626 systemd-logind[1731]: Removed session 16. May 17 00:41:50.733766 systemd[1]: Started sshd@16-172.31.25.158:22-139.178.68.195:43030.service. May 17 00:41:50.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.158:22-139.178.68.195:43030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:50.915000 audit[5872]: USER_ACCT pid=5872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.916000 audit[5872]: CRED_ACQ pid=5872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.916000 audit[5872]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc921affb0 a2=3 a3=0 items=0 ppid=1 pid=5872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:50.920152 sshd[5872]: Accepted publickey for core from 139.178.68.195 port 43030 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:50.918261 sshd[5872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:50.924061 systemd[1]: Started session-17.scope. May 17 00:41:50.924445 systemd-logind[1731]: New session 17 of user core. May 17 00:41:50.929000 audit[5872]: USER_START pid=5872 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:50.931000 audit[5874]: CRED_ACQ pid=5874 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:51.891594 kubelet[2612]: I0517 00:41:51.891529 2612 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:41:52.188000 audit[5880]: NETFILTER_CFG table=filter:131 family=2 entries=12 op=nft_register_rule pid=5880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:52.188000 audit[5880]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc23b9b630 a2=0 a3=7ffc23b9b61c items=0 ppid=2715 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:52.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:52.198000 audit[5880]: NETFILTER_CFG table=nat:132 family=2 entries=34 op=nft_register_chain pid=5880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:52.198000 audit[5880]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc23b9b630 a2=0 a3=7ffc23b9b61c items=0 ppid=2715 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:52.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:54.409271 sshd[5872]: pam_unix(sshd:session): session closed for user core May 17 00:41:54.423222 systemd[1]: Started sshd@17-172.31.25.158:22-139.178.68.195:53700.service. May 17 00:41:54.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.158:22-139.178.68.195:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:54.423000 audit[5872]: USER_END pid=5872 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.426000 audit[5872]: CRED_DISP pid=5872 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.438625 systemd[1]: sshd@16-172.31.25.158:22-139.178.68.195:43030.service: Deactivated successfully. May 17 00:41:54.439634 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:41:54.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.158:22-139.178.68.195:43030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:54.440671 systemd-logind[1731]: Session 17 logged out. Waiting for processes to exit. May 17 00:41:54.441918 systemd-logind[1731]: Removed session 17. May 17 00:41:54.638000 audit[5902]: USER_ACCT pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.640000 audit[5902]: CRED_ACQ pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.641525 sshd[5902]: Accepted publickey for core from 139.178.68.195 port 53700 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:54.640000 audit[5902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfdd77830 a2=3 a3=0 items=0 ppid=1 pid=5902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:54.640000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:54.642972 sshd[5902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:54.653921 systemd[1]: Started session-18.scope. May 17 00:41:54.654303 systemd-logind[1731]: New session 18 of user core. May 17 00:41:54.668561 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 00:41:54.669880 kernel: audit: type=1105 audit(1747442514.659:1529): pid=5902 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.670057 kernel: audit: type=1103 audit(1747442514.666:1530): pid=5907 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.659000 audit[5902]: USER_START pid=5902 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.666000 audit[5907]: CRED_ACQ pid=5907 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:54.979020 env[1739]: time="2025-05-17T00:41:54.978500004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:41:55.165069 env[1739]: time="2025-05-17T00:41:55.164990933Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:55.167313 env[1739]: time="2025-05-17T00:41:55.167181857Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:55.167603 kubelet[2612]: E0517 00:41:55.167441 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:55.171580 kubelet[2612]: E0517 00:41:55.168892 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:55.173704 kubelet[2612]: E0517 00:41:55.173636 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:56dc55be560a4f65a779449400a59c49,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:55.179936 env[1739]: time="2025-05-17T00:41:55.179888076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:41:55.367161 env[1739]: time="2025-05-17T00:41:55.367087728Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:55.369214 env[1739]: time="2025-05-17T00:41:55.369146127Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:55.370014 kubelet[2612]: E0517 00:41:55.369394 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:55.370014 kubelet[2612]: E0517 00:41:55.369440 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:55.370014 kubelet[2612]: E0517 00:41:55.369554 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:55.371307 kubelet[2612]: E0517 00:41:55.371249 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:41:55.943858 sshd[5902]: pam_unix(sshd:session): session closed for user core May 17 00:41:55.945000 audit[5902]: USER_END pid=5902 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:55.959582 kernel: audit: type=1106 audit(1747442515.945:1531): pid=5902 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:55.957754 systemd[1]: sshd@17-172.31.25.158:22-139.178.68.195:53700.service: Deactivated successfully. May 17 00:41:55.958899 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:41:55.945000 audit[5902]: CRED_DISP pid=5902 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:55.959750 systemd-logind[1731]: Session 18 logged out. Waiting for processes to exit. May 17 00:41:55.968412 kernel: audit: type=1104 audit(1747442515.945:1532): pid=5902 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:55.962165 systemd-logind[1731]: Removed session 18. May 17 00:41:55.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.158:22-139.178.68.195:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:55.977241 kernel: audit: type=1131 audit(1747442515.956:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.158:22-139.178.68.195:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:55.979867 systemd[1]: Started sshd@18-172.31.25.158:22-139.178.68.195:53704.service. May 17 00:41:55.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.158:22-139.178.68.195:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:55.991231 kernel: audit: type=1130 audit(1747442515.981:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.158:22-139.178.68.195:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:56.064000 audit[5923]: NETFILTER_CFG table=filter:133 family=2 entries=24 op=nft_register_rule pid=5923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:56.082024 kernel: audit: type=1325 audit(1747442516.064:1535): table=filter:133 family=2 entries=24 op=nft_register_rule pid=5923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:56.082182 kernel: audit: type=1300 audit(1747442516.064:1535): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe5cd0fa60 a2=0 a3=7ffe5cd0fa4c items=0 ppid=2715 pid=5923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.064000 audit[5923]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe5cd0fa60 a2=0 a3=7ffe5cd0fa4c items=0 ppid=2715 pid=5923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:56.088166 kernel: audit: type=1327 audit(1747442516.064:1535): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:56.088000 audit[5923]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:56.088000 audit[5923]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe5cd0fa60 a2=0 a3=0 items=0 ppid=2715 pid=5923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.097122 kernel: audit: type=1325 audit(1747442516.088:1536): table=nat:134 family=2 entries=22 op=nft_register_rule pid=5923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:56.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:56.113000 audit[5925]: NETFILTER_CFG table=filter:135 family=2 entries=36 op=nft_register_rule pid=5925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:56.113000 audit[5925]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdc3170bc0 a2=0 a3=7ffdc3170bac items=0 ppid=2715 pid=5925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:56.120000 audit[5925]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=5925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:56.120000 audit[5925]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdc3170bc0 a2=0 a3=0 items=0 ppid=2715 pid=5925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:56.190000 audit[5920]: USER_ACCT pid=5920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:56.192025 sshd[5920]: Accepted publickey for core from 139.178.68.195 port 53704 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:56.191000 audit[5920]: CRED_ACQ pid=5920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:56.191000 audit[5920]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd37498750 a2=3 a3=0 items=0 ppid=1 pid=5920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:56.196782 sshd[5920]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:56.204652 systemd[1]: Started session-19.scope. May 17 00:41:56.205861 systemd-logind[1731]: New session 19 of user core. May 17 00:41:56.213000 audit[5920]: USER_START pid=5920 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:56.214000 audit[5926]: CRED_ACQ pid=5926 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:57.262058 sshd[5920]: pam_unix(sshd:session): session closed for user core May 17 00:41:57.262000 audit[5920]: USER_END pid=5920 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:57.262000 audit[5920]: CRED_DISP pid=5920 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:57.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.158:22-139.178.68.195:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:57.266887 systemd[1]: sshd@18-172.31.25.158:22-139.178.68.195:53704.service: Deactivated successfully. May 17 00:41:57.269617 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:41:57.270841 systemd-logind[1731]: Session 19 logged out. Waiting for processes to exit. May 17 00:41:57.272394 systemd-logind[1731]: Removed session 19. May 17 00:41:57.286221 systemd[1]: Started sshd@19-172.31.25.158:22-139.178.68.195:53712.service. May 17 00:41:57.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.158:22-139.178.68.195:53712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:57.514000 audit[5934]: USER_ACCT pid=5934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:57.515506 sshd[5934]: Accepted publickey for core from 139.178.68.195 port 53712 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:57.516000 audit[5934]: CRED_ACQ pid=5934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:57.516000 audit[5934]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3486f740 a2=3 a3=0 items=0 ppid=1 pid=5934 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:57.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:57.520338 sshd[5934]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:57.526999 systemd[1]: Started session-20.scope. May 17 00:41:57.527627 systemd-logind[1731]: New session 20 of user core. May 17 00:41:57.532000 audit[5934]: USER_START pid=5934 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:57.534000 audit[5936]: CRED_ACQ pid=5936 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:58.032053 sshd[5934]: pam_unix(sshd:session): session closed for user core May 17 00:41:58.034000 audit[5934]: USER_END pid=5934 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:58.034000 audit[5934]: CRED_DISP pid=5934 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:58.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.158:22-139.178.68.195:53712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:58.037767 systemd[1]: sshd@19-172.31.25.158:22-139.178.68.195:53712.service: Deactivated successfully. May 17 00:41:58.039097 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:41:58.040807 systemd-logind[1731]: Session 20 logged out. Waiting for processes to exit. May 17 00:41:58.042010 systemd-logind[1731]: Removed session 20. May 17 00:42:02.579272 kubelet[2612]: E0517 00:42:02.572861 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:42:03.099656 systemd[1]: Started sshd@20-172.31.25.158:22-139.178.68.195:53722.service. May 17 00:42:03.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.158:22-139.178.68.195:53722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:03.109993 kernel: kauditd_printk_skb: 29 callbacks suppressed May 17 00:42:03.120231 kernel: audit: type=1130 audit(1747442523.104:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.158:22-139.178.68.195:53722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:03.469339 sshd[5948]: Accepted publickey for core from 139.178.68.195 port 53722 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:42:03.468000 audit[5948]: USER_ACCT pid=5948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.481193 kernel: audit: type=1101 audit(1747442523.468:1557): pid=5948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.469000 audit[5948]: CRED_ACQ pid=5948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.492271 kernel: audit: type=1103 audit(1747442523.469:1558): pid=5948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.493254 sshd[5948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:03.499145 kernel: audit: type=1006 audit(1747442523.469:1559): pid=5948 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 17 00:42:03.469000 audit[5948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd750ee0e0 a2=3 a3=0 items=0 ppid=1 pid=5948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.510243 kernel: audit: type=1300 audit(1747442523.469:1559): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd750ee0e0 a2=3 a3=0 items=0 ppid=1 pid=5948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.469000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:42:03.515138 kernel: audit: type=1327 audit(1747442523.469:1559): proctitle=737368643A20636F7265205B707269765D May 17 00:42:03.520825 systemd[1]: Started session-21.scope. May 17 00:42:03.522184 systemd-logind[1731]: New session 21 of user core. May 17 00:42:03.531000 audit[5948]: USER_START pid=5948 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.542248 kernel: audit: type=1105 audit(1747442523.531:1560): pid=5948 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.531000 audit[5951]: CRED_ACQ pid=5951 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.551647 kernel: audit: type=1103 audit(1747442523.531:1561): pid=5951 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:03.559000 audit[5952]: NETFILTER_CFG table=filter:137 family=2 entries=24 op=nft_register_rule pid=5952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:03.573480 kernel: audit: type=1325 audit(1747442523.559:1562): table=filter:137 family=2 entries=24 op=nft_register_rule pid=5952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:03.575572 kernel: audit: type=1300 audit(1747442523.559:1562): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff79b01970 a2=0 a3=7fff79b0195c items=0 ppid=2715 pid=5952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.559000 audit[5952]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff79b01970 a2=0 a3=7fff79b0195c items=0 ppid=2715 pid=5952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:03.577000 audit[5952]: NETFILTER_CFG table=nat:138 family=2 entries=106 op=nft_register_chain pid=5952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:03.577000 audit[5952]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff79b01970 a2=0 a3=7fff79b0195c items=0 ppid=2715 pid=5952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:03.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:04.092000 audit[5948]: USER_END pid=5948 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:04.090746 sshd[5948]: pam_unix(sshd:session): session closed for user core May 17 00:42:04.092000 audit[5948]: CRED_DISP pid=5948 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:04.094694 systemd-logind[1731]: Session 21 logged out. Waiting for processes to exit. May 17 00:42:04.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.158:22-139.178.68.195:53722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:04.096206 systemd[1]: sshd@20-172.31.25.158:22-139.178.68.195:53722.service: Deactivated successfully. May 17 00:42:04.097367 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:42:04.100101 systemd-logind[1731]: Removed session 21. May 17 00:42:05.903011 kubelet[2612]: E0517 00:42:05.902958 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:42:09.130236 systemd[1]: Started sshd@21-172.31.25.158:22-139.178.68.195:34464.service. May 17 00:42:09.151088 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:42:09.151706 kernel: audit: type=1130 audit(1747442529.132:1567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.158:22-139.178.68.195:34464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:09.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.158:22-139.178.68.195:34464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:09.403000 audit[5983]: USER_ACCT pid=5983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.443154 kernel: audit: type=1101 audit(1747442529.403:1568): pid=5983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.444441 kernel: audit: type=1103 audit(1747442529.414:1569): pid=5983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.445468 kernel: audit: type=1006 audit(1747442529.414:1570): pid=5983 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:42:09.445529 kernel: audit: type=1300 audit(1747442529.414:1570): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8a88f6d0 a2=3 a3=0 items=0 ppid=1 pid=5983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:09.414000 audit[5983]: CRED_ACQ pid=5983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.414000 audit[5983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8a88f6d0 a2=3 a3=0 items=0 ppid=1 pid=5983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:09.464102 kernel: audit: type=1327 audit(1747442529.414:1570): proctitle=737368643A20636F7265205B707269765D May 17 00:42:09.414000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:42:09.464289 sshd[5983]: Accepted publickey for core from 139.178.68.195 port 34464 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:42:09.432083 sshd[5983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:09.449992 systemd[1]: Started session-22.scope. May 17 00:42:09.450504 systemd-logind[1731]: New session 22 of user core. May 17 00:42:09.463000 audit[5983]: USER_START pid=5983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.479218 kernel: audit: type=1105 audit(1747442529.463:1571): pid=5983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.465000 audit[5985]: CRED_ACQ pid=5985 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:09.487159 kernel: audit: type=1103 audit(1747442529.465:1572): pid=5985 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:10.417292 sshd[5983]: pam_unix(sshd:session): session closed for user core May 17 00:42:10.436350 kernel: audit: type=1106 audit(1747442530.417:1573): pid=5983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:10.437145 kernel: audit: type=1104 audit(1747442530.418:1574): pid=5983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:10.417000 audit[5983]: USER_END pid=5983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:10.418000 audit[5983]: CRED_DISP pid=5983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:10.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.158:22-139.178.68.195:34464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:10.421526 systemd-logind[1731]: Session 22 logged out. Waiting for processes to exit. May 17 00:42:10.423298 systemd[1]: sshd@21-172.31.25.158:22-139.178.68.195:34464.service: Deactivated successfully. May 17 00:42:10.424327 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:42:10.425784 systemd-logind[1731]: Removed session 22. May 17 00:42:14.028302 kubelet[2612]: E0517 00:42:14.019858 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:42:15.449010 systemd[1]: Started sshd@22-172.31.25.158:22-139.178.68.195:46706.service. May 17 00:42:15.459981 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:42:15.461654 kernel: audit: type=1130 audit(1747442535.449:1576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.158:22-139.178.68.195:46706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:15.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.158:22-139.178.68.195:46706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:15.672000 audit[5996]: USER_ACCT pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.692658 kernel: audit: type=1101 audit(1747442535.672:1577): pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.692763 kernel: audit: type=1103 audit(1747442535.672:1578): pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.698385 kernel: audit: type=1006 audit(1747442535.672:1579): pid=5996 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:42:15.672000 audit[5996]: CRED_ACQ pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.698577 sshd[5996]: Accepted publickey for core from 139.178.68.195 port 46706 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:42:15.712894 kernel: audit: type=1300 audit(1747442535.672:1579): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff348e5130 a2=3 a3=0 items=0 ppid=1 pid=5996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.672000 audit[5996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff348e5130 a2=3 a3=0 items=0 ppid=1 pid=5996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:15.684604 sshd[5996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:15.716480 systemd-logind[1731]: New session 23 of user core. May 17 00:42:15.717790 systemd[1]: Started session-23.scope. May 17 00:42:15.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:42:15.726153 kernel: audit: type=1327 audit(1747442535.672:1579): proctitle=737368643A20636F7265205B707269765D May 17 00:42:15.727000 audit[5996]: USER_START pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.739133 kernel: audit: type=1105 audit(1747442535.727:1580): pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.739000 audit[5998]: CRED_ACQ pid=5998 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:15.749157 kernel: audit: type=1103 audit(1747442535.739:1581): pid=5998 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:16.401881 sshd[5996]: pam_unix(sshd:session): session closed for user core May 17 00:42:16.402000 audit[5996]: USER_END pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:16.414158 kernel: audit: type=1106 audit(1747442536.402:1582): pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:16.416511 systemd[1]: sshd@22-172.31.25.158:22-139.178.68.195:46706.service: Deactivated successfully. May 17 00:42:16.419029 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:42:16.426433 systemd-logind[1731]: Session 23 logged out. Waiting for processes to exit. May 17 00:42:16.413000 audit[5996]: CRED_DISP pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:16.435427 kernel: audit: type=1104 audit(1747442536.413:1583): pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:16.436160 systemd-logind[1731]: Removed session 23. May 17 00:42:16.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.158:22-139.178.68.195:46706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:16.488000 audit[5143]: AVC avc: denied { watch } for pid=5143 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_40_56.219273776/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c939 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c173,c939 tclass=file permissive=0 May 17 00:42:16.488000 audit[5143]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00295e9a0 a2=fc6 a3=0 items=0 ppid=4571 pid=5143 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c939 key=(null) May 17 00:42:16.488000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:42:19.095000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:19.095000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b7da60 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:19.095000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:19.095000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:19.095000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b2b4a0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:19.095000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:19.893363 kubelet[2612]: E0517 00:42:19.893304 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:42:20.423000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:20.423000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c009a9c000 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:42:20.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:42:20.423000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:20.423000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0115bae60 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:42:20.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:42:20.423000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:20.423000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c009a9c030 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:42:20.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:42:20.430000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:20.430000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c01247d0e0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:42:20.430000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:42:20.438000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:20.438000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c01247d1d0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:42:20.438000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:42:20.441000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:20.441000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00fcf55a0 a2=fc6 a3=0 items=0 ppid=2361 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c177 key=(null) May 17 00:42:20.441000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:42:21.427266 systemd[1]: Started sshd@23-172.31.25.158:22-139.178.68.195:46718.service. May 17 00:42:21.439639 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:42:21.439765 kernel: audit: type=1130 audit(1747442541.429:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.158:22-139.178.68.195:46718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:21.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.158:22-139.178.68.195:46718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:21.680000 audit[6008]: USER_ACCT pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.683367 sshd[6008]: Accepted publickey for core from 139.178.68.195 port 46718 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:42:21.691137 kernel: audit: type=1101 audit(1747442541.680:1595): pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.690000 audit[6008]: CRED_ACQ pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.703150 kernel: audit: type=1103 audit(1747442541.690:1596): pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.703563 sshd[6008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:21.714156 kernel: audit: type=1006 audit(1747442541.691:1597): pid=6008 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:42:21.691000 audit[6008]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7c72f7c0 a2=3 a3=0 items=0 ppid=1 pid=6008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.719010 systemd-logind[1731]: New session 24 of user core. May 17 00:42:21.720858 systemd[1]: Started session-24.scope. May 17 00:42:21.727144 kernel: audit: type=1300 audit(1747442541.691:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7c72f7c0 a2=3 a3=0 items=0 ppid=1 pid=6008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:21.691000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:42:21.733202 kernel: audit: type=1327 audit(1747442541.691:1597): proctitle=737368643A20636F7265205B707269765D May 17 00:42:21.733000 audit[6008]: USER_START pid=6008 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.745705 kernel: audit: type=1105 audit(1747442541.733:1598): pid=6008 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.745000 audit[6010]: CRED_ACQ pid=6010 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:21.758143 kernel: audit: type=1103 audit(1747442541.745:1599): pid=6010 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:22.163780 sshd[6008]: pam_unix(sshd:session): session closed for user core May 17 00:42:22.164000 audit[6008]: USER_END pid=6008 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:22.177141 kernel: audit: type=1106 audit(1747442542.164:1600): pid=6008 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:22.164000 audit[6008]: CRED_DISP pid=6008 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:22.186154 kernel: audit: type=1104 audit(1747442542.164:1601): pid=6008 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:22.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.158:22-139.178.68.195:46718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:22.188448 systemd[1]: sshd@23-172.31.25.158:22-139.178.68.195:46718.service: Deactivated successfully. May 17 00:42:22.189907 systemd-logind[1731]: Session 24 logged out. Waiting for processes to exit. May 17 00:42:22.190809 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:42:22.192171 systemd-logind[1731]: Removed session 24. May 17 00:42:24.887000 audit[5314]: AVC avc: denied { watch } for pid=5314 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_40_56.1018337499/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c234,c629 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c234,c629 tclass=file permissive=0 May 17 00:42:24.887000 audit[5314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ac87e0 a2=fc6 a3=0 items=0 ppid=5086 pid=5314 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c234,c629 key=(null) May 17 00:42:24.887000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:42:27.191548 systemd[1]: Started sshd@24-172.31.25.158:22-139.178.68.195:51396.service. May 17 00:42:27.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.158:22-139.178.68.195:51396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:27.195138 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 00:42:27.195239 kernel: audit: type=1130 audit(1747442547.191:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.158:22-139.178.68.195:51396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:27.430334 sshd[6041]: Accepted publickey for core from 139.178.68.195 port 51396 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:42:27.427000 audit[6041]: USER_ACCT pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.429000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.450903 kernel: audit: type=1101 audit(1747442547.427:1605): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.451958 kernel: audit: type=1103 audit(1747442547.429:1606): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.452026 kernel: audit: type=1006 audit(1747442547.429:1607): pid=6041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:42:27.451382 sshd[6041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:27.429000 audit[6041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadb74eb0 a2=3 a3=0 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:27.467343 kernel: audit: type=1300 audit(1747442547.429:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadb74eb0 a2=3 a3=0 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:27.468184 kernel: audit: type=1327 audit(1747442547.429:1607): proctitle=737368643A20636F7265205B707269765D May 17 00:42:27.429000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:42:27.477023 systemd-logind[1731]: New session 25 of user core. May 17 00:42:27.478293 systemd[1]: Started session-25.scope. May 17 00:42:27.488000 audit[6041]: USER_START pid=6041 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.500148 kernel: audit: type=1105 audit(1747442547.488:1608): pid=6041 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.499000 audit[6043]: CRED_ACQ pid=6043 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.510147 kernel: audit: type=1103 audit(1747442547.499:1609): pid=6043 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:27.700000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:27.708351 kernel: audit: type=1400 audit(1747442547.700:1610): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:27.717261 kernel: audit: type=1300 audit(1747442547.700:1610): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc7de0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:27.700000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc7de0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:27.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:27.700000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:27.700000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b459e0 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:27.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:27.717000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:27.717000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc7e40 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:27.717000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:27.718000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:27.718000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc7e60 a2=fc6 a3=0 items=0 ppid=2325 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:27.718000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:28.146153 kubelet[2612]: E0517 00:42:28.146074 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:42:28.442170 sshd[6041]: pam_unix(sshd:session): session closed for user core May 17 00:42:28.455000 audit[6041]: USER_END pid=6041 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:28.456000 audit[6041]: CRED_DISP pid=6041 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:28.459528 systemd[1]: sshd@24-172.31.25.158:22-139.178.68.195:51396.service: Deactivated successfully. May 17 00:42:28.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.158:22-139.178.68.195:51396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:28.461305 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:42:28.462105 systemd-logind[1731]: Session 25 logged out. Waiting for processes to exit. May 17 00:42:28.463376 systemd-logind[1731]: Removed session 25. May 17 00:42:30.982847 systemd[1]: run-containerd-runc-k8s.io-e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a-runc.HmI1se.mount: Deactivated successfully. May 17 00:42:31.897572 kubelet[2612]: E0517 00:42:31.897531 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:42:33.469524 systemd[1]: Started sshd@25-172.31.25.158:22-139.178.68.195:51404.service. May 17 00:42:33.481326 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:42:33.482407 kernel: audit: type=1130 audit(1747442553.468:1617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.158:22-139.178.68.195:51404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:33.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.158:22-139.178.68.195:51404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:33.731000 audit[6083]: USER_ACCT pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.740195 kernel: audit: type=1101 audit(1747442553.731:1618): pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.740290 sshd[6083]: Accepted publickey for core from 139.178.68.195 port 51404 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:42:33.748994 kernel: audit: type=1103 audit(1747442553.732:1619): pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.753676 kernel: audit: type=1006 audit(1747442553.732:1620): pid=6083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:42:33.732000 audit[6083]: CRED_ACQ pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.732000 audit[6083]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2518bc80 a2=3 a3=0 items=0 ppid=1 pid=6083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:33.775162 kernel: audit: type=1300 audit(1747442553.732:1620): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2518bc80 a2=3 a3=0 items=0 ppid=1 pid=6083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:33.775268 kernel: audit: type=1327 audit(1747442553.732:1620): proctitle=737368643A20636F7265205B707269765D May 17 00:42:33.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:42:33.741797 sshd[6083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:42:33.788603 kernel: audit: type=1105 audit(1747442553.776:1621): pid=6083 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.776000 audit[6083]: USER_START pid=6083 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.764738 systemd-logind[1731]: New session 26 of user core. May 17 00:42:33.765561 systemd[1]: Started session-26.scope. May 17 00:42:33.789000 audit[6085]: CRED_ACQ pid=6085 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:33.799299 kernel: audit: type=1103 audit(1747442553.789:1622): pid=6085 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:34.654659 sshd[6083]: pam_unix(sshd:session): session closed for user core May 17 00:42:34.654000 audit[6083]: USER_END pid=6083 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:34.669008 kernel: audit: type=1106 audit(1747442554.654:1623): pid=6083 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:34.666405 systemd[1]: sshd@25-172.31.25.158:22-139.178.68.195:51404.service: Deactivated successfully. May 17 00:42:34.667587 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:42:34.669526 systemd-logind[1731]: Session 26 logged out. Waiting for processes to exit. May 17 00:42:34.654000 audit[6083]: CRED_DISP pid=6083 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:34.681446 kernel: audit: type=1104 audit(1747442554.654:1624): pid=6083 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:42:34.671796 systemd-logind[1731]: Removed session 26. May 17 00:42:34.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.158:22-139.178.68.195:51404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:37.235108 systemd[1]: run-containerd-runc-k8s.io-deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f-runc.WRhryS.mount: Deactivated successfully. May 17 00:42:43.925938 env[1739]: time="2025-05-17T00:42:43.925623518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:42:44.105633 env[1739]: time="2025-05-17T00:42:44.105563402Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:44.107608 env[1739]: time="2025-05-17T00:42:44.107544350Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:44.114547 kubelet[2612]: E0517 00:42:44.112470 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:42:44.119175 kubelet[2612]: E0517 00:42:44.119092 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:42:44.140375 kubelet[2612]: E0517 00:42:44.137588 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-j9lf9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vpk7m_calico-system(bdc4c222-6e91-430d-bb4e-7e63d4524888): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:44.142244 kubelet[2612]: E0517 00:42:44.142178 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:42:45.891850 env[1739]: time="2025-05-17T00:42:45.891735245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:42:46.053299 env[1739]: time="2025-05-17T00:42:46.053233125Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:46.055387 env[1739]: time="2025-05-17T00:42:46.055290882Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:46.056339 kubelet[2612]: E0517 00:42:46.056285 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:46.057456 kubelet[2612]: E0517 00:42:46.056369 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:42:46.057456 kubelet[2612]: E0517 00:42:46.056559 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:56dc55be560a4f65a779449400a59c49,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:46.059515 env[1739]: time="2025-05-17T00:42:46.059470979Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:42:46.244268 env[1739]: time="2025-05-17T00:42:46.244091194Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:42:46.246378 env[1739]: time="2025-05-17T00:42:46.246321826Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:42:46.246576 kubelet[2612]: E0517 00:42:46.246539 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:46.246654 kubelet[2612]: E0517 00:42:46.246591 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:42:46.246732 kubelet[2612]: E0517 00:42:46.246695 2612 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5c52g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5cd8f45bdf-lrhbq_calico-system(46fff1a5-2bcc-4999-b953-02ef302ea2d4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:42:46.248817 kubelet[2612]: E0517 00:42:46.247946 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:42:49.268410 kubelet[2612]: E0517 00:42:49.268333 2612 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:42:50.812481 systemd[1]: cri-containerd-2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4.scope: Deactivated successfully. May 17 00:42:50.822358 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:42:50.823419 kernel: audit: type=1334 audit(1747442570.814:1626): prog-id=83 op=UNLOAD May 17 00:42:50.823485 kernel: audit: type=1334 audit(1747442570.814:1627): prog-id=91 op=UNLOAD May 17 00:42:50.814000 audit: BPF prog-id=83 op=UNLOAD May 17 00:42:50.814000 audit: BPF prog-id=91 op=UNLOAD May 17 00:42:50.822832 systemd[1]: cri-containerd-2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4.scope: Consumed 3.902s CPU time. May 17 00:42:50.860149 env[1739]: time="2025-05-17T00:42:50.860087363Z" level=info msg="shim disconnected" id=2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4 May 17 00:42:50.861319 env[1739]: time="2025-05-17T00:42:50.860675611Z" level=warning msg="cleaning up after shim disconnected" id=2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4 namespace=k8s.io May 17 00:42:50.861319 env[1739]: time="2025-05-17T00:42:50.860700480Z" level=info msg="cleaning up dead shim" May 17 00:42:50.868095 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4-rootfs.mount: Deactivated successfully. May 17 00:42:50.874007 env[1739]: time="2025-05-17T00:42:50.873967436Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6150 runtime=io.containerd.runc.v2\n" May 17 00:42:50.882351 systemd[1]: cri-containerd-3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963.scope: Deactivated successfully. May 17 00:42:50.882698 systemd[1]: cri-containerd-3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963.scope: Consumed 12.542s CPU time. May 17 00:42:50.886850 kernel: audit: type=1334 audit(1747442570.881:1628): prog-id=120 op=UNLOAD May 17 00:42:50.881000 audit: BPF prog-id=120 op=UNLOAD May 17 00:42:50.893542 kernel: audit: type=1334 audit(1747442570.888:1629): prog-id=123 op=UNLOAD May 17 00:42:50.888000 audit: BPF prog-id=123 op=UNLOAD May 17 00:42:50.915357 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963-rootfs.mount: Deactivated successfully. May 17 00:42:50.916786 env[1739]: time="2025-05-17T00:42:50.916734551Z" level=info msg="shim disconnected" id=3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963 May 17 00:42:50.917483 env[1739]: time="2025-05-17T00:42:50.917160986Z" level=warning msg="cleaning up after shim disconnected" id=3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963 namespace=k8s.io May 17 00:42:50.917483 env[1739]: time="2025-05-17T00:42:50.917181517Z" level=info msg="cleaning up dead shim" May 17 00:42:50.926632 env[1739]: time="2025-05-17T00:42:50.926586636Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6177 runtime=io.containerd.runc.v2\n" May 17 00:42:51.645386 kubelet[2612]: I0517 00:42:51.642749 2612 scope.go:117] "RemoveContainer" containerID="2b133ecadf7d8ef2259e25ac9b60cb3abb7ffa307a349d6453d0c0d1aa7790b4" May 17 00:42:51.651505 kubelet[2612]: I0517 00:42:51.651455 2612 scope.go:117] "RemoveContainer" containerID="3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963" May 17 00:42:51.681546 env[1739]: time="2025-05-17T00:42:51.681496019Z" level=info msg="CreateContainer within sandbox \"403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" May 17 00:42:51.682813 env[1739]: time="2025-05-17T00:42:51.682769102Z" level=info msg="CreateContainer within sandbox \"8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" May 17 00:42:51.717724 env[1739]: time="2025-05-17T00:42:51.717672760Z" level=info msg="CreateContainer within sandbox \"403efde1e25a5bbbd6ce2d1e17532483841315660e660aecbf55e31b38b1f4e4\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3\"" May 17 00:42:51.718417 env[1739]: time="2025-05-17T00:42:51.718382557Z" level=info msg="StartContainer for \"d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3\"" May 17 00:42:51.730906 env[1739]: time="2025-05-17T00:42:51.730853307Z" level=info msg="CreateContainer within sandbox \"8f0983f9d24eb93eff5a9b6e487deeb3957e3e18f92ef5fda8ceaeb907661954\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"8ee546902f08949098e5fc3be4f24d1d6fffba5250b7311a3567f0dc1510cd56\"" May 17 00:42:51.731846 env[1739]: time="2025-05-17T00:42:51.731808253Z" level=info msg="StartContainer for \"8ee546902f08949098e5fc3be4f24d1d6fffba5250b7311a3567f0dc1510cd56\"" May 17 00:42:51.742731 systemd[1]: Started cri-containerd-d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3.scope. May 17 00:42:51.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.801204 kernel: audit: type=1400 audit(1747442571.778:1630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.801322 kernel: audit: type=1400 audit(1747442571.778:1631): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.801359 kernel: audit: type=1400 audit(1747442571.778:1632): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.815654 kernel: audit: type=1400 audit(1747442571.778:1633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.825559 kernel: audit: type=1400 audit(1747442571.778:1634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.813407 systemd[1]: Started cri-containerd-8ee546902f08949098e5fc3be4f24d1d6fffba5250b7311a3567f0dc1510cd56.scope. May 17 00:42:51.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836107 kernel: audit: type=1400 audit(1747442571.778:1635): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.785000 audit: BPF prog-id=222 op=LOAD May 17 00:42:51.787000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2737 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356439666432376230303535636530363032313765303835386334 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2737 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356439666432376230303535636530363032313765303835386334 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.787000 audit: BPF prog-id=223 op=LOAD May 17 00:42:51.787000 audit[6200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000243a0 items=0 ppid=2737 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356439666432376230303535636530363032313765303835386334 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit: BPF prog-id=224 op=LOAD May 17 00:42:51.836000 audit[6200]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243e8 items=0 ppid=2737 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356439666432376230303535636530363032313765303835386334 May 17 00:42:51.836000 audit: BPF prog-id=224 op=UNLOAD May 17 00:42:51.836000 audit: BPF prog-id=223 op=UNLOAD May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { perfmon } for pid=6200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit[6200]: AVC avc: denied { bpf } for pid=6200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.836000 audit: BPF prog-id=225 op=LOAD May 17 00:42:51.836000 audit[6200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247f8 items=0 ppid=2737 pid=6200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356439666432376230303535636530363032313765303835386334 May 17 00:42:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.856000 audit: BPF prog-id=226 op=LOAD May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2325 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653534363930326630383934393039386535666333626534663234 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2325 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653534363930326630383934393039386535666333626534663234 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit: BPF prog-id=227 op=LOAD May 17 00:42:51.857000 audit[6223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019ac80 items=0 ppid=2325 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653534363930326630383934393039386535666333626534663234 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.857000 audit: BPF prog-id=228 op=LOAD May 17 00:42:51.857000 audit[6223]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019acc8 items=0 ppid=2325 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653534363930326630383934393039386535666333626534663234 May 17 00:42:51.869000 audit: BPF prog-id=228 op=UNLOAD May 17 00:42:51.869000 audit: BPF prog-id=227 op=UNLOAD May 17 00:42:51.869000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { perfmon } for pid=6223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit[6223]: AVC avc: denied { bpf } for pid=6223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:51.869000 audit: BPF prog-id=229 op=LOAD May 17 00:42:51.869000 audit[6223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019b0d8 items=0 ppid=2325 pid=6223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:51.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653534363930326630383934393039386535666333626534663234 May 17 00:42:51.866276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1069717180.mount: Deactivated successfully. May 17 00:42:51.887856 env[1739]: time="2025-05-17T00:42:51.887797389Z" level=info msg="StartContainer for \"d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3\" returns successfully" May 17 00:42:51.913414 env[1739]: time="2025-05-17T00:42:51.913289850Z" level=info msg="StartContainer for \"8ee546902f08949098e5fc3be4f24d1d6fffba5250b7311a3567f0dc1510cd56\" returns successfully" May 17 00:42:52.438283 systemd[1]: run-containerd-runc-k8s.io-e01f38c53e91718b763746f5f4f3c3c5db7a347117103f42b04e5f303936951a-runc.jsxkHJ.mount: Deactivated successfully. May 17 00:42:53.446000 audit[6233]: AVC avc: denied { watch } for pid=6233 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:53.446000 audit[6233]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00049b890 a2=fc6 a3=0 items=0 ppid=2325 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:53.446000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:53.446000 audit[6233]: AVC avc: denied { watch } for pid=6233 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:42:53.446000 audit[6233]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000078580 a2=fc6 a3=0 items=0 ppid=2325 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c725 key=(null) May 17 00:42:53.446000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:42:55.617227 systemd[1]: cri-containerd-e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a.scope: Deactivated successfully. May 17 00:42:55.617492 systemd[1]: cri-containerd-e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a.scope: Consumed 2.621s CPU time. May 17 00:42:55.621000 audit: BPF prog-id=79 op=UNLOAD May 17 00:42:55.621000 audit: BPF prog-id=107 op=UNLOAD May 17 00:42:55.643660 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a-rootfs.mount: Deactivated successfully. May 17 00:42:55.646492 env[1739]: time="2025-05-17T00:42:55.646438106Z" level=info msg="shim disconnected" id=e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a May 17 00:42:55.648155 env[1739]: time="2025-05-17T00:42:55.648084876Z" level=warning msg="cleaning up after shim disconnected" id=e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a namespace=k8s.io May 17 00:42:55.648318 env[1739]: time="2025-05-17T00:42:55.648289899Z" level=info msg="cleaning up dead shim" May 17 00:42:55.658060 env[1739]: time="2025-05-17T00:42:55.658008323Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:42:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6294 runtime=io.containerd.runc.v2\n" May 17 00:42:55.891647 kubelet[2612]: E0517 00:42:55.891517 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:42:56.645913 kubelet[2612]: I0517 00:42:56.645882 2612 scope.go:117] "RemoveContainer" containerID="e715e2b530144b991243af8c54d4fbc25a0d261c4989361176fec22acd56812a" May 17 00:42:56.648176 env[1739]: time="2025-05-17T00:42:56.648107131Z" level=info msg="CreateContainer within sandbox \"f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" May 17 00:42:56.673954 env[1739]: time="2025-05-17T00:42:56.673897778Z" level=info msg="CreateContainer within sandbox \"f0fa388ba88dd2c0642093d757f6e80078a316ecdca28ae8c4ec7854c12c69fb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"b9e855f35e547604747051ddcb708fd22cebb02abc517b543c1aaeaade2f120d\"" May 17 00:42:56.674542 env[1739]: time="2025-05-17T00:42:56.674489442Z" level=info msg="StartContainer for \"b9e855f35e547604747051ddcb708fd22cebb02abc517b543c1aaeaade2f120d\"" May 17 00:42:56.712945 systemd[1]: run-containerd-runc-k8s.io-b9e855f35e547604747051ddcb708fd22cebb02abc517b543c1aaeaade2f120d-runc.GiFqtY.mount: Deactivated successfully. May 17 00:42:56.719142 systemd[1]: Started cri-containerd-b9e855f35e547604747051ddcb708fd22cebb02abc517b543c1aaeaade2f120d.scope. May 17 00:42:56.742796 kernel: kauditd_printk_skb: 116 callbacks suppressed May 17 00:42:56.743685 kernel: audit: type=1400 audit(1747442576.739:1670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.755843 kernel: audit: type=1400 audit(1747442576.739:1671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.762148 kernel: audit: type=1400 audit(1747442576.739:1672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.775590 kernel: audit: type=1400 audit(1747442576.739:1673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.775752 kernel: audit: type=1400 audit(1747442576.739:1674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.776423 kernel: audit: type=1400 audit(1747442576.739:1675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.788398 kernel: audit: type=1400 audit(1747442576.739:1676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.789019 kernel: audit: type=1400 audit(1747442576.739:1677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.802444 kernel: audit: type=1400 audit(1747442576.739:1678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.809526 kernel: audit: type=1400 audit(1747442576.741:1679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit: BPF prog-id=230 op=LOAD May 17 00:42:56.741000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2305 pid=6316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653835356633356535343736303437343730353164646362373038 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2305 pid=6316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653835356633356535343736303437343730353164646362373038 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.741000 audit: BPF prog-id=231 op=LOAD May 17 00:42:56.741000 audit[6316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000357f40 items=0 ppid=2305 pid=6316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653835356633356535343736303437343730353164646362373038 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit: BPF prog-id=232 op=LOAD May 17 00:42:56.748000 audit[6316]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000357f88 items=0 ppid=2305 pid=6316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653835356633356535343736303437343730353164646362373038 May 17 00:42:56.748000 audit: BPF prog-id=232 op=UNLOAD May 17 00:42:56.748000 audit: BPF prog-id=231 op=UNLOAD May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { perfmon } for pid=6316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit[6316]: AVC avc: denied { bpf } for pid=6316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:56.748000 audit: BPF prog-id=233 op=LOAD May 17 00:42:56.748000 audit[6316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003cc398 items=0 ppid=2305 pid=6316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:56.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653835356633356535343736303437343730353164646362373038 May 17 00:42:56.829026 env[1739]: time="2025-05-17T00:42:56.828968016Z" level=info msg="StartContainer for \"b9e855f35e547604747051ddcb708fd22cebb02abc517b543c1aaeaade2f120d\" returns successfully" May 17 00:42:57.892409 kubelet[2612]: E0517 00:42:57.892362 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-5cd8f45bdf-lrhbq" podUID="46fff1a5-2bcc-4999-b953-02ef302ea2d4" May 17 00:42:59.269623 kubelet[2612]: E0517 00:42:59.269326 2612 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:43:04.113000 audit: BPF prog-id=222 op=UNLOAD May 17 00:43:04.114481 systemd[1]: cri-containerd-d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3.scope: Deactivated successfully. May 17 00:43:04.117451 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:43:04.117563 kernel: audit: type=1334 audit(1747442584.113:1688): prog-id=222 op=UNLOAD May 17 00:43:04.119000 audit: BPF prog-id=225 op=UNLOAD May 17 00:43:04.124155 kernel: audit: type=1334 audit(1747442584.119:1689): prog-id=225 op=UNLOAD May 17 00:43:04.142736 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3-rootfs.mount: Deactivated successfully. May 17 00:43:04.171982 env[1739]: time="2025-05-17T00:43:04.171926238Z" level=info msg="shim disconnected" id=d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3 May 17 00:43:04.171982 env[1739]: time="2025-05-17T00:43:04.171984751Z" level=warning msg="cleaning up after shim disconnected" id=d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3 namespace=k8s.io May 17 00:43:04.171982 env[1739]: time="2025-05-17T00:43:04.171997829Z" level=info msg="cleaning up dead shim" May 17 00:43:04.182060 env[1739]: time="2025-05-17T00:43:04.182003083Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:43:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6360 runtime=io.containerd.runc.v2\n" May 17 00:43:04.682033 kubelet[2612]: I0517 00:43:04.682001 2612 scope.go:117] "RemoveContainer" containerID="3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963" May 17 00:43:04.682630 kubelet[2612]: I0517 00:43:04.682543 2612 scope.go:117] "RemoveContainer" containerID="d35d9fd27b0055ce060217e0858c4a79f216960af7a96895f5e42df915ba76e3" May 17 00:43:04.686344 kubelet[2612]: E0517 00:43:04.686293 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-844669ff44-62bns_tigera-operator(c07d7f7a-bdc8-44be-bdad-fada51419b38)\"" pod="tigera-operator/tigera-operator-844669ff44-62bns" podUID="c07d7f7a-bdc8-44be-bdad-fada51419b38" May 17 00:43:04.701313 env[1739]: time="2025-05-17T00:43:04.701272818Z" level=info msg="RemoveContainer for \"3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963\"" May 17 00:43:04.707395 env[1739]: time="2025-05-17T00:43:04.707350255Z" level=info msg="RemoveContainer for \"3acac1e28201768a0bf4c7f0c098ed6611474a6a83bf1f927bf88d40b28e9963\" returns successfully" May 17 00:43:06.892076 kubelet[2612]: E0517 00:43:06.892035 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vpk7m" podUID="bdc4c222-6e91-430d-bb4e-7e63d4524888" May 17 00:43:07.229798 systemd[1]: run-containerd-runc-k8s.io-deed3de45e34d88214489d1006bb61567ad85aaa60d3bb89e8175d83d35b050f-runc.IaF79C.mount: Deactivated successfully. May 17 00:43:09.273971 kubelet[2612]: E0517 00:43:09.273876 2612 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-158?timeout=10s\": context deadline exceeded"